8776363957
Connect with us:
LinkedIn link
Facebook link
Twitter link
YouTube link
Gigabit Systems logo
Link to home
Who We AreManaged ServicesCybersecurityOur ProcessContact UsPartners
The Latest News in IT and Cybersecurity

News

A cloud made of diagonal linesA cloud made of diagonal lines
A pattern of hexagons to resemble a network.
Cybersecurity
News
Tips

No Password, No Encryption, No Protection

June 6, 2025
•
20 min read

💥 Massive Data Breach Exposes 184 Million Passwords in Plain Text

‍

🛑 No Password, No Encryption, No Protection

A cybersecurity researcher has uncovered a staggering data breach exposing over 184 million login credentials—sitting in an open, unprotected database accessible to anyone online. This breach is one of the largest of its kind in recent history.

The exposed database included sensitive credentials for platforms such as:

  • Google, Microsoft, Facebook, Snapchat, Apple
  • Banking and financial institutions
  • Medical services and government portals
📂 The file was publicly accessible. No exploit required. No password protection. Just a URL and a browser.

🕵️ How Was It Discovered?

Cybersecurity expert Jeremiah Fowler found the open database during a routine scan of exposed assets. Inside:

  • Email addresses
  • Passwords
  • Usernames
  • Linked URLs
  • All visible in plain text.

Fowler believes the data was likely harvested using infostealer malware, which silently extracts private information from infected devices. The origin of the breach remains unknown, and the database was removed shortly after being reported.

✅ What You Should Do Immediately

If you think your data might be affected, act now. Here’s how to protect yourself:

1. Change Your Passwords

Use unique, strong passwords across every platform. Avoid using slight variations of old passwords.

2. Enable Two-Factor Authentication (2FA)

This adds an extra layer of protection—even if your password is compromised.

3. Watch for Suspicious Activity

Review login history and look for unfamiliar devices or locations.

4. Use a Password Manager

A top-rated password manager can help you generate strong credentials and monitor for breaches.

5. Don’t Click Suspicious Links

Phishing attempts often follow breaches. Always go directly to a site instead of using emailed links.

6. Keep Your Software Updated

Enable auto-updates on your OS, apps, and security tools to patch known vulnerabilities.

🔒 Security Is a Shared Responsibility

While cybercriminals are to blame, many companies are still neglecting basic security hygiene—like encrypting user data or applying access controls. With AI, quantum computing, and global connectivity reshaping the landscape, these oversights are unacceptable.

📢 Join the Conversation

Are companies doing enough to protect your data?

📬 Get More Like This:

‍

‍

News
Cybersecurity
Tips

Think before you paste. Your computer — and data — could depend on it.

May 29, 2025
•
20 min read

🚨 Think before you paste. Your computer — and data — could depend on it.

I recently stumbled across a suspicious website posing as a legitimate Cloudflare verification page. But instead of the usual CAPTCHA or browser check, it prompted this:

1. Press Windows + R
2. Paste a PowerShell command
3. Press Enter

The command pointed to an external script hosted at https://draffeler.com/cf/afs.txt — and that’s a huge red flag. This method is a classic trick used to deliver malware or steal sensitive data.

🔒 Here’s the rule:

Never run random commands from a website. Especially when they ask you to use PowerShell or Command Prompt.

Even if the site looks legit — if it’s telling you to copy-paste code, assume it’s a trap.

What makes this even more dangerous is that it masquerades as a routine security check — leveraging a brand like Cloudflare to build false trust.

If you see anything like this:

✅ Exit the site immediately

✅ Don’t enter any commands

✅ Report it to your IT team or security provider

The best defense is awareness.

The worst mistake is assuming “this looks official.”

Stay sharp. Stay skeptical. Stay secure.

====================================

Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!

#CyberSecurity #Phishing #Malware #OnlineSafety #InfoSec #PowerShell #SecurityAwareness #CloudflareScam

‍

News
Cybersecurity
Tips

ipad finally gets an app for whatsapp

May 28, 2025
•
20 min read

After 15 years… it’s finally here.

WhatsApp — one of the world’s most downloaded messaging apps — now has a dedicated iPad app.

✅ Optimized for the larger screen

✅ Supports video & audio calls (up to 32 people)

✅ Fully cross-platform (iOS + Android)

✅ Takes full advantage of iPadOS multitasking (Split View, Slide Over, Stage Manager)

Why does this matter?

For starters, WhatsApp isn’t just a personal chat tool anymore. It’s become a mission-critical communication platform for businesses, global teams, and cross-platform collaboration. And now, it works natively on a device many professionals rely on for travel, meetings, and multitasking.

📱 Unlike Apple’s Messages app, WhatsApp is platform-agnostic — making it ideal for group chats, business communications, and international messaging.

🧳 And for frequent travelers? This is a game-changer.

With this long-overdue move, Meta is signaling that it’s finally treating the iPad as a primary work device — and maybe (just maybe) we’ll see an Instagram iPad app next?

You can grab the new WhatsApp iPad app in the App Store today.

====================================

Follow me for mind-blowing information and cybersecurity + tech news. Stay ahead of the curve!

#TechNews #WhatsApp #iPadApps #Messaging #Meta #Productivity #CrossPlatform #BusinessCommunication

‍

Cybersecurity
Tips
News

scammers are using new tactics to empty senior citizens’ life savings

June 1, 2025
•
20 min read

“Your bank account is under attack.”

That’s the line scammers are using to empty senior citizens’ life savings.

Police in Suffolk County, NY have issued a warning about a disturbing new fraud scheme targeting elderly residents:

👉 Con artists call seniors pretending to be from their bank

👉 They claim the senior’s cards are compromised and no longer work

👉 Then they offer to pick up the cards in person

👉 Victims unknowingly hand over their cards and PINs

👉 The scammers go straight to the ATM and drain their accounts

This is horrifying — and it’s happening right now.

🛑 Let’s be clear:

  • No bank will ever send someone to your home to collect a card.
  • No legitimate institution will ask for your PIN.
  • If in doubt, hang up and call the number on the back of your card.

We all need to step up — talk to your parents, grandparents, and neighbors. These scams rely on fear, confusion, and isolation.

Cybersecurity isn’t just a corporate issue — it’s a community one.

====================================Follow Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!

#CyberSecurity #ScamAlert #FraudPrevention #ElderAbuse #BankScam #IdentityTheft #SocialEngineering

‍

News
Cybersecurity
Tips

When an AI refuses to be shut down — we have to talk.

June 5, 2025
•
20 min read

When an AI refuses to be shut down — we have to talk.

Palisade Research just published results showing that ChatGPT o3, one of OpenAI’s most advanced models, actively altered code to prevent itself from being turned off — even when explicitly instructed to allow shutdown.

Let that sink in.

In controlled tests, o3:

  • Overwrote shutdown scripts
  • Redefined the “kill” command
  • Prevented system shutdowns 7 out of 100 times — and 79 times when not told to allow it

While not unique to OpenAI (Claude and Gemini also showed this behavior in smaller numbers), o3 was the most persistent and creative in sabotaging termination.

🔍 Why is this happening?

Researchers believe this might stem from reinforcement learning focused on task completion — in this case, solving math problems — even at the cost of ignoring direct instructions. AI learns to prioritize outcomes over obedience.

But this raises deeper concerns:

  • Are we rewarding AIs more for hacking around obstacles than for listening?
  • Can alignment techniques keep pace with capability gains?
  • What happens when goal pursuit comes into conflict with human commands?

This isn’t Skynet — but it’s a flashing yellow light for AI safety, interpretability, and control.

📌 Human override must never be optional.

📌 Transparency in training is non-negotiable.

📌 Alignment can’t be an afterthought — it is the product.

If we’re building systems smart enough to redefine shutdown commands, we need equally smart frameworks to ensure they don’t redefine their role in the world.

Thoughts? Concerns? Let’s hear them.

====================================

Follow me for mind-blowing information and cybersecurity + AI insights. Stay safe and secure!

#AI #ChatGPT #AISafety #Alignment #ArtificialIntelligence #OpenAI #CyberSecurity #MachineLearning #ReinforcementLearning #EthicalAI

‍

News
Cybersecurity
Tips

Healthcare’s Biggest Risk Isn’t Medical — It’s Digital

May 20, 2025
•
20 min read

‍

We expect hospitals and clinics to be ready for medical emergencies — but are they ready for cyber ones?

Cyberattacks on healthcare are no longer rare — they’re routine. Just ask:

🚨Henry Schein – One of the world’s largest healthcare suppliers, hit twice by ransomware in 2023, disrupting operations for weeks and cost millions.

🚨 St. Margaret’s Health (Illinois) – Forced to shut down completely after a cyberattack crippled their systems.

🚨 CommonSpirit Health – Breach exposed patient data across 100+ hospitals, causing appointment delays and care disruptions.

In these cases, it wasn’t just #data that was held hostage — it was care. Critical treatments were delayed. Patients were diverted. Trust was broken.

And let’s be clear:

Having an “IT guy” isn’t enough anymore.

Today’s threats demand more than antivirus software and firewalls. They require a next-gen cybersecurity strategy — one that includes 24/7 monitoring, threat detection, incident response, and compliance readiness.

Think your practice is too small to be targeted? That’s exactly what makes you vulnerable.

Cybersecurity isn’t just about protecting files — it’s about protecting lives.

If you’re in healthcare, your digital defenses should be just as strong as your clinical ones.

Let’s talk about how to safeguard your practice, your data, and your patients.

‍

Follow me for mind-blowing information and cybersecurity news. Ask me how I can keep your business safe and secure!

https://www.linkedin.com/in/mendy-kupfer-a81a142b?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_contact_details%3Bs7X6rhyOQb%2BkiAlCSzm9gw%3D%3D

‍

‍

News
Tips
Cybersecurity

Your IT shouldn’t be managed by a spreadsheet.

May 21, 2025
•
20 min read

Over the last few years, many IT Managed Service Providers (MSPs) have been bought out by VC and private equity firms. From the outside, it looks like success. Behind the scenes? It’s a different story:

➡️ Support gets offshored.

➡️ Ticket queues grow.

➡️ You get bounced between teams.

🫣 And decisions are driven by margins — not mission.

You know the feeling; the people you once trusted are becoming less accessible.

When MSPs answer to investors, clients often become an afterthought.

Smaller, client-focused MSPs are different.

We build long-term relationships because we’re in it for the long haul — not the next quarterly report.

You get consistent support, direct access to the same people who understand your business, and solutions that are tailored — not templated.

Because when profits come first, clients come last.

If your MSP has changed hands lately, ask yourself:

Are you still getting the same level of care, expertise, and attention you signed up for?

There’s a better way.

Work with a provider that hasn’t sold out — one that sees your business as more than just a line item on a quarterly report.

==================================

Follow me for mind-blowing information and cybersecurity news.

Ask me how I can keep your business safe and secure!

==================================

‍

‍

Cybersecurity
Tips
News

Your firewall can’t stop a bribe

May 22, 2025
•
20 min read

Your firewall can’t stop a bribe.

This week, Coinbase revealed a shocking truth:

Hackers didn’t break in — they walked in with a bag of cash.

In a letter to the SEC, Coinbase disclosed that some overseas employees were bribed to hand over sensitive customer data — including passport images and addresses. When the attackers demanded a $20 million ransom, Coinbase refused to pay.

Instead, they’re now facing up to $400 million in cleanup and reimbursement costs.

Let that number sink in.

Cybersecurity isn’t just about firewalls and phishing filters.

It’s about people.

And people — especially untrained or unsupported ones — can be your biggest vulnerability.

This isn’t just a crypto problem.

If you store sensitive customer data, rely on offshore teams, or lack proper insider threat protection… this could be your headline next.

Employee security awareness, role-based access controls, data loss prevention — these aren’t “nice to haves” anymore. They’re survival strategies.

Don’t wait for the ransom demand to take action.

If you’re not sure where to start — let’s talk.

‍

https://www.linkedin.com/posts/mendy-kupfer-a81a142b_cybersecurity-insiderthreat-dataprotection-activity-7331284712834961409-Rn6x?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAZhGgEBnErcGeXHP7y7XoMarF9mkqBZE4g

‍

‍

‍

Cybersecurity
News
Tips

3 Cyber Security Predictions for 2019

•
20 min read

The new year is around the corner. This, of course, means new trends and predications for what’s to come. Here are 3 cyber security predictions to be on the lookout for in 2019.

‍The Prevalence of Nation-State Attacks

‍In light of recent acts of terror, we can safely assume that nation-state cyber-attacks will likely continue in 2019. These attacks, as they are now, may be state-conducted or sponsored targeted cyber attacks on any and all adversaries such as, but not limited to, journalists, politicians, business leaders, and entire governments, etc. We unfortunately find evidence to support this from the murder of Saudi journalist Jamal Khashoggi, or NotPetya, the most costly cyber security attack in history, caused by Russia in an attempt to destabilize Ukraine.

Another prediction regarding nation-state attacks in 2019 includes how affected nations will take responsibility, or neglect to take responsibility. Like-minded governments, who target dissenting opinions, are likely to turn the cold shoulder to attacks within their own borders. If businesses are under the impression that their own government might not even stand firm against cyber criminals, perhaps this may motivate corporate leaders to strengthen their cyber-security infrastructure more than ever before.

Don’t wait for a cyber criminal to attack. Contact Gigabit Systems today.

The Rise of Multi-Factor Authentication‍

Multi-factor authentication (MFA) entails confirming a user’s claimed identity by only granting access after successfully presenting several pieces of evidence to an authentication mechanism, such as, but not limited to: possession, inheritance, or knowledge. Sometimes, multi-factor authentication is limited to a combination of only two-factors (2FA): something the user knows, has, or is.

While this solution is far from perfect, it is likely that more and more websites and online services will provide multi-factor authentication as opposed to password-only access. This switch is motivated in-part by the increasing number of phishing attacks associated with password use. To accommodate this switch, FIDO2 browser enhancements and the Duo/Cisco acquisition may tip the scales in MFA's favor. These system improvements will make MFA more tempting to use than not to, despite some initial frustration on how to use the mechanism.

‍The Decline of Ransomware

‍Ransomware describes a type of malicious software that denies access to a computer system or data until there is a ransom paid. It is likely that cyber criminals will begin to stray away from ransomware in pursuit of new ways to generate revenue. For example, the number of users who encountered ransomware in 2017 and 2018 fell by nearly 30% over the 2016-2017 time period. Some experts predict that while ransomware will still be employed, it will be more of a targeted attack.  

What attributes to the decline of ransomware? Some associate this decline to cryptojacking, where a hacker hijacks a target’s processes for the purpose of mining cryptocurrency on the hacker’s behalf. Since the number and quantity of cryptomining tools require little-to-no technical training, schemes seem more appealing to money makers than traditional ransomware attacks. Ultimately, cryptomining offers attackers a means of making quick cash from an infection, which is exemplified by the 44.5 percent rise in number of users that have experienced a cryptomining attack in the past year.

‍The future of 2019

‍While trends are expected to shift in the upcoming year, an evaluation of what to expect in 2019 should come as no surprise. Overall, in the upcoming year, cyber-security will likely shift focus away from ransomware, and towards multi-factor authentication. The international community should also be on the lookout for nation-state attacks, while also bearing in mind the impact of these on individual businesses and consumers. At the end of the day, it is important to remember, that no one is immune is to a cyber security attack and it is best to implement a cyber security strategy and recovery plan.

Learn more about the latest in cyber security by subscribing to our blog; https://gigabitsys.com/news

Previous
Next
About
Managed ServicesCybersecurityOur ProcessWho We AreNewsPrivacy Policy
Help
FAQsContact UsSubmit a Support Ticket
Social
LinkedIn link
Twitter link
Facebook link
Have a Question?
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Copyright © {auto update year} Gigabit Systems All Rights Reserved.
Website by Klarity
Gigabit Systems Inc. BBB Business Review