Yearly Archives: 2021


Yet Another Cybersecurity Prediction Article For 2022

As tradition in the InfoSec world dictates, it’s time for us to prognosticate what 2022 is going to look like with cyber attacks and other issues. Log4j As of right now, Log4j will be the gift that keeps on giving. To catch up on Log4j/log4shell stuff, check out our article that we’ve been updating. Because [...]

Log4j and Log4shell Updates

This article, while hastily written, will be as brief as possible with regard to log4j /log4shell. We’ve been updating our newsletter subscribers about it shortly after it the Minecraft exploitation. To subscribe to the newsletter for cyber security and intelligence news, tips, tricks, and tool here’s the sign-up link Software vulnerabilities log4j: A logging [...]

Bsquared Intel’s Ultimate Holiday Shopping Cyber Security Guide

This article contains an affiliate link for ProtonVPN which we have an independent partnership with. Welcome to Bsquared Intel’s Ultimate Holiday Shopping Cyber Security Guide! If you are one of the 158 million people that the National Retailers Federation estimates will go shopping this Black Friday [Source: Yahoo! News] it’s a good time to keep [...]

8 Ways to Improve Your Privacy

Here are eight ways you can improve your privacy if you’re concerned about others snooping on your social media profiles, advertisers tracking you online, those going through your trash, those interested in your conversations or whereabouts, and protecting your files/devices. 1. Get your social media under control Limit the amount of information you share. We’ve [...]

3 Ways Cybersquatting Harms Your Business

Cybersquatting is defined as: “… registering, trafficking in, or using an Internet domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else. The cybersquatter then offers to sell the domain to the person or company who owns a trademark contained within the name at an inflated price.” [...]

Connecticut Public Act No. 21-119: Cyber Security Standards for Businesses

Hello everyone and thanks for stopping by. We wanted to take a quick minute to highlight what Connecticut Governor Ned Lamont recently signed into the law other day.  Before we dive in, an obligatory disclaimer.  We are not lawyers.  This post is not considered legal advice or a legal opinion.  We urge you to consult [...]

Why ransomware attacks keep happening

Based on reporting and our own observations, here are some reasons why ransomware isn't letting up any time soon: Cyber liability insurance policies with ransomware/extortion policies in them have incentivised attackers. The bad actors know that if their victim organization has a cyber extortion policy, they'll be paid. Some industries, like healthcare, may end up [...]

How does an unauthorized user gain access?

To start, an unauthorized user is someone who doesn't have permission to access a computer or a system. Unauthorized access is bypassing security policies and controls to said computer or system. Here are a few ways this happens: In Verizon's 2021 Data Breach Investigations Report, the FBI's 2020 Internet Crime Report, and EUROPOL's Internet Organized [...]