Entries by

Why do you need a top-down approach to IT security?

Why do you need a top-down approach to IT security? For any organization, its employees are its biggest assets. But, what happens when your biggest assets turn out to be your greatest threats or liabilities? That is how cybercrime can change the game. In a recent study, it came to light that employee actions account […]


30,000 Macs Infected with New Silver Sparrow Malware⚠️

About Silver Sparrow Security researchers have spotted a new malware operation targeting Mac devices that has silently infected almost 30,000 systems. Named Silver Sparrow, the malware was discovered by security researchers from Red Canary and analyzed together with researchers from Malwarebytes and VMWare Carbon Black. “According to data provided by Malwarebytes, Silver Sparrow had infected […]


Things to consider before switching to the Cloud

Things to consider before switching to the Cloud More and more businesses are switching to the Cloud to store their data and rightly so. The Cloud offers numerous benefits over the traditional, physical on site server. For example, Anytime, anywhere access to your data: Information in the Cloud can be accessed from anywhere using an […]

Protecting yourself against poison attacks⚠️

Protecting yourself against poison attacks Data poisoning by way of logic corruption, data manipulation and data injection happen when the attacker finds a way to access your data set. The kind of poison attack varies depending on the level of access the attacker is able to achieve. Here’s what you can do to ensure such […]


Google Patches an Actively Exploited Chrome Zero-Day⚠️

Google has released version 88.0.4324.150 of the Chrome browser for Windows, Mac, and Linux. This release contains only one bugfix for a zero-day vulnerability that was exploited in the wild. What You Can Do Users are advised to use Chrome’s built-in update feature to upgrade their browser to the latest version as soon as possible. […]


ALERT: New Phishing Scams

Acumen would like to warn of recent phishing scams, or email attacks, that we have seen in our Security Response Center.  In some cases, these domains are whitelisted as legitimate organizations, have been released by employees from Quarantine, or the Spam filtering systems do not detect these for a few hours until their security teams […]