Blog
Sharing the latest news from emerging cyber threats to CMMC, best practices and cybersecurity insights, our blog features resources for executives and business leaders from our cybersecurity expert CISOs.

What Happens to Your Data When Using Otter.ai
We don’t allow note-taker apps during company meetings. Last week, one of our new people had their Otter.ai notetaker app come in before the meeting. It was promptly dismissed, and after the meeting, I took a few minutes to explain ‘you have no idea where that data goes.

HiatusRAT: The Evolving Threat to IoT Devices
A PRC-based threat actor active since 2022 has recently expanded its attack scope to include DVRs and IOT Cameras. These same actors have, in the past, targeted the DIB (Defense Industrial Base) of the US and Taiwan.

CMMC (Cybersecurity Maturity Model Certification) takes effect 12/16/24. Are you ready?
The Cybersecurity Maturity Model Certification (CMMC) becomes mandatory on December 16, 2024. Trusted Internet helps your business prepare with confidence.

Protecting Customers from Cyber Threats on Black Friday and Cyber Monday: A Guide for Companies

Avanan vs. Microsoft Defender: An AI Authored Email Security Compare and Contrast
Based on the search results, here's a comparison of Avanan and Microsoft Defender for Office 365 (formerly known as Microsoft Advanced Threat Protection or ATP) for email protection

Sextortion Scams Get Personal: Attackers Now Including Photos of Victims' Homes
Sextortion scams have taken a disturbing new turn, with attackers now including photos of victims' homes in their threatening emails. This latest tactic aims to make the scam appear more credible and increase the fear factor for potential victims.

Protect Yourself from Cyber Scams: How Fake Google Ads Trick Users into Installing Dangerous Malware
Think You're Downloading a Google App? Think Again—Cybercriminals Are Tricking Users with Fake Ads

BlackSuit Ransomware: An Emerging Apex Cyber Threat
BlackSuit ransomware is becoming a top cyber threat. Learn how this emerging strain works, who it's targeting, and how to protect your business from its attack.

Is Your TP-Link Router Putting You at Risk of Chinese Spying Attacks?

Ransomware-as-a-Service 'Eldorado' Targets Windows & Linux Systems

Crowdstrike – Trusted Internet comments and recommendations

CryptoChameleon: Vishing and Phishing Threats Exploiting LastPass and Beyond

How Volt Typhoon Works and 4 Indicators You’ve Been Compromised
