Author:

In-House IT vs. Managed IT Services: Which Model Makes the Most Sense for Your Business?

Technology is at the heart of every modern business, but how companies manage their IT needs can vary significantly. The choice between maintaining an in-house IT team or outsourcing to a Managed IT Services Provider (MSP) like InfiniTech is a crucial decision that impacts efficiency, cost, security, and scalability. In […]

Weekly Cybersecurity Roundup for Week of Feb 17, 2025

New Variant of XCSSET macOS Malware Discovered Researchers have identified a new variant of the XCSSET malware, which primarily targets macOS users through malicious Xcode projects. Why it matters: This development highlights the growing sophistication of macOS threats, emphasizing the need for developers to verify software integrity and enhance endpoint […]

The Rise of Virtual CIOs (vCIOs) and What It Means for SMBs

Introduction Small and medium-sized businesses (SMBs) are increasingly facing complex IT challenges that were once only a concern for large enterprises. As digital transformation accelerates, businesses must navigate cybersecurity threats, compliance requirements, cloud migration, and IT strategy—often without the in-house expertise to do so effectively. This is where a Virtual […]

Weekly Cybersecurity Roundup for Week of Feb 10th, 2025

Georgia Hospital Data Breach Exposes 120,000 Patient Records A cyberattack on St. Joseph’s/Candler Health System in Georgia has resulted in the exposure of sensitive data from approximately 120,000 individuals. The breach, which was first detected in December 2023, involved unauthorized access to patient information, including names, Social Security numbers, and […]

Weekly Cybersecurity Roundup for Week of Feb 3rd, 2025

1. CISA Identifies 21 Actively Exploited CVEs in 2024 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has highlighted 21 vulnerabilities that have been actively exploited in cyberattacks this year. According to CISA, these CVEs—some newly disclosed and others previously known—pose significant threats as cybercriminals and nation-state actors continue to […]

Weekly Cybersecurity Roundup for Week of Jan 27, 2025

1. SaaS Applications Becoming a Major Attack Vector for Cybercriminals A new report highlights that SaaS applications are increasingly being targeted by cybercriminals due to lax security measures and inadequate visibility into these platforms. The study reveals that 55% of SaaS applications are misconfigured, creating significant vulnerabilities that attackers exploit. […]

Weekly Cybersecurity Roundup for Week of Dec 9, 2024

Recent developments in cybersecurity and artificial intelligence have highlighted emerging threats and regulatory responses. Below is a summary of key articles detailing these issues: 1. QR Codes Bypass Browser Isolation for Malicious C2 Communication Researchers at Mandiant have uncovered a method by which threat actors use QR codes to circumvent […]

Weekly Cybersecurity Roundup for Week of Dec 2, 2024

Corrupted Word Files Fuel Phishing Attackers are using corrupted Microsoft Word files to deliver phishing attacks, exploiting document vulnerabilities to trick victims into downloading malicious payloads. This trend highlights the importance of cautious file handling and updated security protocols to combat such tactics.Read more Critical Vulnerabilities in Industrial Wireless Access Points […]

Cybersecurity Roundup for Week of 11/22/24

1. Black Friday Spam Emails: 77% Identified as Scams A recent report by Bitdefender found that 77% of Black Friday-themed spam emails in 2024 are fraudulent, a 7% rise from last year. These emails are designed to steal sensitive information or money by mimicking trusted retailers and offering fake deals. […]

Weekly Cybersecurity Roundup for Week of Nov 11, 2024

1. New ‘Interlock’ Ransomware Targets U.S. Healthcare Organizations A recent campaign by the newly identified ‘Interlock’ ransomware is targeting U.S. healthcare entities, marking an escalating threat for an industry frequently affected by cybercrime. Interlock’s operators are leveraging a dual-extortion approach, not only encrypting victims’ data but also threatening to release […]