According to IBM, the global average cost of a data breach in 2024 was $4.88 million-an increase of 10 percent over 2023 and the highest total ever. Over the last forty-nine years, I’ve witnessed many technological advances. It seems like yesterday when my father brought home a Tandy computer. Now, every home has multiple devices-from […]
In the aftermath of a critical ransomware attack, an educational institution reached out to WYRE for help. With over 1,200 endpoints and more than 900 staff members, the scope of the cleanup was daunting. The attack had not only threatened operations but also left critical systems vulnerable. The institution urgently needed help to recover from […]
No matter your industry, cybersecurity is no longer an option-it’s a necessity. This is where Microsoft 365’s enhanced security features come into play, with everything from automated threat detection to advanced conditional access policies. This enterprise-level protection bolsters your organization’s defenses and allows you to focus on growth, customers, and innovation, knowing your security is […]
Just as you would never leave your physical office unlocked and unattended, securing your technology is equally crucial. But wading through complex security settings can be overwhelming (to say the least). This is where Microsoft 365’s default security settings come in-a basic approach that offers a surprising amount of protection for your business. M365 Default […]
For today’s banking industry, ensuring uninterrupted services is a more complex undertaking than ever. From fortifying digital banking platforms to protecting sensitive customer data, the challenges are unending. Recently, a regional bank reached out to WYRE for help with implementation of Microsoft 365’s Active Directory Certificate Services (AD CS). They were looking to incorporate encryption, […]
By Anthony Jirouschek, Security Architect On July 2nd, we published an article about an attack we observed using EtherHiding and Fake-Updates to deliver the Lumma infostealer. After the article was published, we did some threat hunting and found a different version of this attack that uses encoding to obfuscate, or hide, the attack better. As […]
By Anthony Jirouschek, Security Architect We recently observed an attack using EtherHiding to deliver Fake-Updates malware, which eventually resulted in an infostealer named Lumma being installed. EtherHiding is essentially using smart contracts on a crypto platform to obscure and deliver malicious code. In this case, the threat actor used Binance’s Smart Chain contracts. EtherHiding is […]
Unsafe websites can cause chaos. But they’re everywhere, and at some point, you’re going to run into one. How can you spot a malicious site? Let’s take a look at a real-world example. QUESTIONS? WYRE ALWAYS HELPS.
Technology is everywhere. And its use in our day-to-day lives presents both incredible opportunities and significant risks for businesses of all sizes. While enabling us to streamline operations, reach wider audiences, and innovate like never before, technology also exposes us to cyberthreats that can disrupt operations, steal sensitive information, and damage reputations. Cybercrime effects everyone. […]
Cyberattacks can happen to anyone. But the more you know, the easier cyberattacks are to spot. Let’s take a quick look at three common types-and some easy ways to protect yourself. QUESTIONS? WYRE ALWAYS HELPS.