Aesthetic Home and Interior Design Website, Havenly Confirms Data Breach

  Cyber Attack of the Week 23 Hello, everyone! Today is Friday, August 6th, 2020. Can you believe we are already in August? Due to COVID, I personally feel I am mentally stuck in March. But now, we are nearing the end of summer, and rolling into fall.  Further, what I have determined through the years is that as the fall weather looms and more people cozy up in their homes, decorating the space you live in becomes a hobby. (For myself at least!) Getting to the point, during this time, many people turn to various platforms for design inspiration. This could include sites like Pinterest, Instagram shops or today’s… Read More

Continue Reading

Current Tech Favorites – Apps for the iPad

  Curious as to what apps are worth your money on the App Store? We’ve got you covered.   The Wonderful World of iPad Apps This Monday, CPG is taking a look at some of our favorite apps for the iPad. Whether the app is for productivity or just fun, we have it covered.  To begin, I personally purchased an iPad Pro. With this purchase, I had great hopes of using it for all sorts of things. From drawing, to editing bid documents, this device really comes in handy. Throughout my trials of finding the best apps for each task presented, I believe that I have compiled a list of… Read More

Continue Reading

Garmin Shuts Down Services for ‘Maintenance” After Ransomware Attack

  On July 23, 2020 Garmin, a GPS navigation and wearable technology company reported a ransomware attack that shutdown various sites and services to their customers.  At first, the attack was only reported as an issue included in an ongoing investigation. But, several employees of Garmin took to social media outlets to share the news of the ransomware attack.  Now, before we dive into the attack, let’s take a look at Garmin as a company, to better understand the impact of the attack.    Garmin  To begin, Garmin (per their About page on their website) “makes products that are engineered on the inside for life on the outside. We do… Read More

Continue Reading

Ransomware Attack Strikes Lorien Health Services – An Assisted Care and Living Facility

  Cyber Attack of the Week 21 Once again, it appears that COVID-19 era hackers found another target in the healthcare field. This week, reports state that a Maryland based nursing home became a recent victim of a ransomware attack.  The recent attack indicates that tens of thousands of patients in the facility may now be victims of the data breach.  In the article, CPG is taking a look at the attack and the response from the nursing home. Now, let’s dive into this week’s cyber attack.   The Attack – Lorien Health Services Lorien Health Services is a family owned, elderly care company based in Maryland. The company has… Read More

Continue Reading

To Keep or not to Keep – How to Decide Whether or not to Dispose of the Product Box

  Over the years, the boxes really do pile up, but so does the attachment to the empty container. Is it possible to let it all go? The answer is yes, and CPG is here to help.   Over the last couple months while millions of people quarantined due to COVID-19, many took to decluttering in their home. As many activities became limited, organizing within the home became a “hobby” for many.  Further, as many took to the closets, kitchen cabinets and the garage to declutter, many people were often faced with the same question. How long should I keep a product box?   2010 called, they want their iPhone… Read More

Continue Reading

142 Million MGM Hotel Guest Records for Sale Online

  After the announcement of the breach in the summer of 2020, MGM thought things couldn’t get any worse. But, it seems as though things just might have…    MGM Grand A recent discovery by researchers indicates that over 142 million guest records from the MGM Grand are currently for sale, online. Thus, indicating that the data breach from summer 2019 is an even bigger problem than originally imagined.  To begin, back in the summer of 2019, the MGM Grand Hotel located in Las Vegas, Nevada faced a data breach. It wasn’t until February 2020, that the hotel announced the breach to the public.  In a previous article written by… Read More

Continue Reading

New Office 365 Phishing Scheme uses Zoom to Level up Attacks

  Recent reports indicate that cyber criminals are trying to steal Office 365 credentials through fake Zoom suspension alerts. Now, as if things could get any more worse than having to use Zoom as your main form of office communication, they just might have. To begin, Microsoft users are the new target of attack for scammers. The ploy is in an act to steal Office credentials, the scammer sends a fake Zoom account suspension notice.  The main idea of this attack is to make the victims think that their Zoom account is under suspension. From there, this can open up a wide range of attacks for scammers to steal Office… Read More

Continue Reading

IT Company DXC Technology Announces Ransomware Attack on Subsidiary Xchanging

  On July 5th, IT provider, DXC Technology released a statement regarding their recent ransomware attack. The attack occurred in their subsidiary company, Xchanging.  Before we get started on the ransomware attack, let’s look into the companies in question.    DXC and Xchanging To begin, DXC Technology is a multinational IT service and solution provider.    DXC Technology helps our customers across the entire Enterprise Technology Stack with differentiated industry solutions. We modernize IT, optimize data architectures, and make everything secure, scalable and orchestrated across public, private and hybrid clouds. (Via DCX Tech Company Overview).   Overall, a tech company, providing IT services. Further, their subsidiary, Xchanging, is a similar… Read More

Continue Reading

UCSF Pays over a Million Dollars in Ransom to Hackers

   “We therefore made the difficult decision to pay some portion of the ransom, approximately $1.14 million…”   UCSF Under Attack On June 3rd, 2020, The University of California San Francisco (UCSF) announced a portion of their school faced a data breach. The portion of UCSF affected is the UCSF School of Medicine.  Reports indicate that the ransomware used to attack the school traces back to Netwalker Ransomware. After the discovery of the security incident and data encryption, UCSF decided to pay over one million dollars in ransom, for a decryption key.  Now, let’s take a look at the incident in greater detail, to understand the attack in its entirety. … Read More

Continue Reading

Bug Bounty Programs – Where is the Money At?

  Due to COVID-19, many in the tech and cyber world are looking for their next project. Looks like it is time to start hunting some hacks…    Bug bounty hunting is a term that is thrown around a lot in the tech world. Many are familiar with the practice, but others may just be getting started.  Bug bounty hunting is the practice of finding critical flaws in software for a company, and being rewarded monetarily for such efforts. Basically, find the issues that could potentially bring a company down and get paid for it.  So today, CPG is taking a look at a few of the top bug bounty programs… Read More

Continue Reading