Home

Stay Connected.

Subscribe to our newsletter for the latest tech news, and info on services, solutions and future events!

Thank you!
SpaceBound Solutions Blog
The Tools Schools need to defend against Ransomware
Oct 13

Oct 13 The Tools Schools need to defend against Ransomware

Bob
Cybersecurity

Schools are at a greater cybersecurity risk than ever. Here are tools schools can use to defend against ransomware

A PowerPoint Exploit is being used to Spread Russian Malware
Oct 11

Oct 11 A PowerPoint Exploit is being used to Spread Russian Malware

Bob

The malicious PowerPoint exploit doesn’t even require the victim to click on anything for the attack to be triggered.

Is your Photo being used to Train Artificial Intelligence? Now you can check
Oct 6

Oct 6 Is your Photo being used to Train Artificial Intelligence? Now you can check

Bob
AI, Cybersecurity

The website lets you search for anything, and returns results that are being used to train AI systems

New Security Risk can Exfiltrate Data using GIFs
Oct 4

Oct 4 New Security Risk can Exfiltrate Data using GIFs

Bob
Cybersecurity

The attack can execute without the victim even opening the specially crafted GIF

FBI Advisory Warns of Cybercriminals Targeting Healthcare Payment Processors
Sep 29

Sep 29 FBI Advisory Warns of Cybercriminals Targeting Healthcare Payment Processors

Bob
Cybersecurity

Back in February, over #3.1 Million was stolen in just one attack.

Los Angeles Unified School District recovering after Ransomware Attack
Sep 27

Sep 27 Los Angeles Unified School District recovering after Ransomware Attack

Bob
Cybersecurity

The attack still has the country’s second largest school district trying to return to full capacity

New Ransomware Warning Focuses on Group Targeting Education Sector
Sep 22

Sep 22 New Ransomware Warning Focuses on Group Targeting Education Sector

Bob
Cybersecurity

The joint warning was released by the FBI, CISA, and MS-ISAC

“High Severity” TikTok Vulnerability Subjected Accounts to Possible Hijacking
Sep 20

Sep 20 “High Severity” TikTok Vulnerability Subjected Accounts to Possible Hijacking

Bob
Cybersecurity

The vulnerability could have let a threat actor take control of an unsuspecting user’s account with one click.

Malicious Chrome Extensions removed from Chrome Web Store
Sep 15

Sep 15 Malicious Chrome Extensions removed from Chrome Web Store

Bob
Cybersecurity

A combined 1.4 users downloaded the extensions before they were removed from the Web Store

New Strains of Ransomware cause Number of Attacks to Spike
Sep 13

Sep 13 New Strains of Ransomware cause Number of Attacks to Spike

Bob
Cybersecurity

The number of ransomware cases jumped 47%, thanks to new strains infecting their targets

Google Discovers Iranian Hacking Tool that Steals Data from Email Accounts
Sep 8

Sep 8 Google Discovers Iranian Hacking Tool that Steals Data from Email Accounts

Bob
Cybersecurity

The tool, which steals user data, also deletes a warning email from Google notifying the user of a suspicious login.

Expert creates Raspberry Pi-powered Tool that can Track whether you’re being followed
Sep 6

Sep 6 Expert creates Raspberry Pi-powered Tool that can Track whether you’re being followed

Bob
Technology

The tool scans for devices within a certain time limit, and alerts you when devices are spotted multiple times

New Malware is being developed to Bypass Android Security Features
Sep 1

Sep 1 New Malware is being developed to Bypass Android Security Features

Bob
Cybersecurity

The new vulnerability is used to find ways to work around Google Play security protections

Robotexts are Gaining Popularity with Scammers
Aug 30

Aug 30 Robotexts are Gaining Popularity with Scammers

Bob
Cybersecurity

Estimates show that consumers received over 12 billion robotexts in June alone

The “Disturbing Trend” in Software Patches – and how it’s being addressed
Aug 25

Aug 25 The “Disturbing Trend” in Software Patches – and how it’s being addressed

Bob
Cybersecurity

ZDI released new guidelines in hopes to initiate improvements needed to handle important software flaws

How Organizations can secure their IoT Devices
Aug 23

Aug 23 How Organizations can secure their IoT Devices

Bob
Cybersecurity

Here are steps IT teams can take to secure the IoT devices in their network

These are the most Impersonated Apps used in Malware Attacks
Aug 18

Aug 18 These are the most Impersonated Apps used in Malware Attacks

Bob
Cybersecurity

Hackers are impersonating famous apps in hopes they’ll conduct a successful social engineering attack

Recent Social Media Attack Exposes User Data on the Dark Web
Aug 16

Aug 16 Recent Social Media Attack Exposes User Data on the Dark Web

Bob
Cybersecurity

The compromised database exposed the accounts of 5.4 million Twitter users

Malware-Infested Apps Removed from Google Play Store
Aug 11

Aug 11 Malware-Infested Apps Removed from Google Play Store

Bob
Cybersecurity

The malware has infected apps that total over 3 million installs through the store

New Malware Discovered can turn a Simple Google Search into Possible Ransomware
Aug 9

Aug 9 New Malware Discovered can turn a Simple Google Search into Possible Ransomware

Bob
Cybersecurity

A specific Google search prompts an ad to be displayed at the top of the results page that could really mean trouble for even the most careful user

Load More

Stay Connected.

Subscribe to our newsletter for the latest tech news, and info on services, solutions and future events!

Thank you!

Powered by Squarespace