Payload-less attacks play a dangerous role in bypassing cybersecurity Phishing emails have long since evolved from the early days of poorly spelled spam-attacks hinting at long-lost wealthy ancestors. While we at Bytagig often lament the flimsy strings of cybersecurity and how social-engineering scams circumvent even the...

Essential strategies for remote working connections COVID-19 created a wealth of opportunities for hackers to strike at vulnerable networks. Because remote working has seen greater widespread use, the problem is exacerbated. Companies are left scrambling because adapting to remote working solutions to combat quarantine complications has...

Tycoon ransomware hits Windows and Linux with obscure methods According to a report by ZDNet, ransomware entitled “Tycoon” is targeting Windows and Linux systems. The ransomware first emerged in December 2019 and prioritizes very specific targets, versus the traditional “shotgun” approach of infecting as many systems...

Budgeting with Cybersecurity and its importance What’s the worst part about malware? It’s getting better, sneakier, and more destructive. What’s another horrible fact involving malware? Throwing money at the problem doesn’t do much, and in fact, makes the situation worse.  Impossible, you think, money fixes everything, especially...

A troubling lack of change even after data-breaches After data-breaches, companies typically make changes to their security infrastructure. Calls for increased cybersecurity, expanding budget into defense strategies, and raising awareness are part of that. But, here’s a scary something: even after data-breaches, many still don’t change...

A malware used with COVID-19 TrickBot is no stranger to the malware universe, a common trojan payload that’s harassed users and companies for years. With COVID-19, however, TrickBot has found a new fear-factor to exploit in hopes to spread faster. What is TrickBot? Trickbot is a banking trojan...

An Overview of Credential Stuffing Attacks Let’s be frank - the modern business model is pathetically underprepared for the rapid pace of growing technology and the coinciding cybersecurity threats. Data breaches are at an all-time high, escalating since 2011, and every new annum yet more personal...

Excel Documents are Part of New Phishing Campaign Attacks The coronavirus problem and cybersecurity breaches are no strangers to the other. So much that Microsoft has recently raised awareness about a phishing campaign designed to steal user information. The Microsoft Intel team reports malicious actors to...