8776363957
Connect with us:
LinkedIn link
Facebook link
Twitter link
YouTube link
Gigabit Systems logo
Link to home
Who We AreManaged ServicesCybersecurityOur ProcessContact UsPartners
The Latest News in IT and Cybersecurity

News

A cloud made of diagonal linesA cloud made of diagonal lines
A pattern of hexagons to resemble a network.
Crypto
News

A string of brutal kidnappings has crypto holders on high alert — and one family just took their security offline, off-grid, and global.

June 9, 2025
•
20 min read

🧳 Bitcoin Goes Global: Why One Family Hid Crypto Keys on Four Continents

A string of brutal kidnappings has crypto holders on high alert — and one family just took their security offline, off-grid, and global.

The Taihuttu family, known as the “Bitcoin Family,” sold everything to go all-in on crypto in 2017. Today, they live nomadically and unbanked — and they’ve just ditched hardware wallets in favor of a radical, decentralized system that splits their Bitcoin seed phrases across four continents.

“Even if someone held me at gunpoint, I can’t give them access. The seed is split, encrypted, and scattered,”
— Didi Taihuttu

Why the Change?

After receiving credible threats and seeing other crypto figures kidnapped for ransom — including Ledger co-founders and a Manhattan tourist tortured for 17 days — Taihuttu re-engineered his family’s entire crypto custody model:

🔐 Seed phrases are split 6 words at a time (4 sets = 24 words)

🪙 Each set is either encrypted digitally or etched into fireproof steel plates

🌍 Plates are hidden in physical locations on 4 continents

🧩 Even if someone finds 18 of the 24 words, it’s useless without Taihuttu’s personal encryption system

📲 Hot wallets are protected with multi-signature and MPC technology

Why It Matters for Businesses, Law Firms, and Institutions

If a family of five is willing to go to this length, what are you doing to protect your crypto assets?

Whether you manage client funds, support blockchain initiatives, or simply hold digital assets, you need to rethink:

  • 🔄 Single points of failure — Are your wallets centralized or duplicated?
  • 🛡️ Custody risk — Are third-party devices or platforms holding your private keys?
  • 🧠 Staff training — Could an attacker exploit an unaware employee?
  • 🔑 Access models — Are you using multi-signature or MPC-based security?
“We’ve been famous in a niche market. Now that niche is big — and dangerous.”

What You Can Do Now

At Gigabit Systems, we help clients transition to hardened, zero-trust digital asset security strategies:

✅ Adopt multi-signature wallets (like Safe, formerly Gnosis)

✅ For large holdings, consider MPC (Multi-Party Computation) protocols

✅ Split cold storage geographically or organizationally — don’t rely on one custodian

✅ Ditch untrusted hardware — audit all third-party wallet tools

✅ Stay invisible — reduce public exposure of digital holdings

If the world’s most committed crypto nomads are moving off hardware wallets and decentralizing their key access globally… it might be time you did, too.

👇 Comment if your firm or practice handles crypto or digital assets.

🔁 Share with anyone whose wallet might be more accessible than they think.

====================================

Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!

Because 70% of all cyberattacks target small businesses—

I can help protect yours.

‍

‍

#CryptoSecurity #Bitcoin #SelfCustody #ManagedITServices #DecentralizedFinance

‍

Tips
Cybersecurity
News

Crypto wallets under attack

•
20 min read

💸 Crypto Trap: New NFT “Airdrop” Scheme Drains Wallets in Seconds

The FBI just issued a critical alert: scammers are exploiting the Hedera Hashgraph network’s NFT airdrop feature to instantly steal crypto. What looks like a free reward is a cleverly disguised phishing attack.

How the Scam Works

Cybercriminals send unauthorized NFTs or tokens to your non-custodial Hedera wallet. When the “transaction” appears, a “memo” field urges you—with a link—to claim your reward. Clicking it leads to a fake dApp/page that asks for your wallet credentials or seed phrase. Once entered, they empty your wallet in seconds.

  • Scams are circulating via social media ads, phishing emails, and fake project websites  .

  • Once scammers have your seed phrase, they gain full control of your funds.

Why This Impacts Businesses, Law Firms, and Healthcare Providers

Even if you’re not a serious crypto investor, these threats matter:

  • Legal firms handling crypto casework

  • Healthcare orgs piloting tokenized patient incentives

  • Schools exploring blockchain credentials

  • SMBs & MSPs offering blockchain trials to clients

A compromised wallet can lead to unauthorized transactions, exposed private data, and regulatory headaches.

How to Defend Your Wallet and Your Organization

At Gigabit Systems, we recommend these proactive defenses:

✅ Never click unsolicited NFT airdrop links.

✅ Verify airdrops via official Hedera channels before interacting.

✅ Never share seed phrases or passwords.

✅ Monitor wallet activity for unfamiliar transactions.

✅ Revoke unused dApp permissions using tools like revoke.cash.

✅ Use hardware wallets for storing significant crypto assets.

These simple steps dramatically reduce your exposure to wallet drains.

Final Word

This isn’t just a crypto issue—it’s a cybersecurity case study in trust and verification. As emerging web3 technologies integrate into professional systems, vigilance becomes critical. If you’re advising clients or using these platforms, pass this on.

👇 Comment if your organization deals with blockchain or crypto in any capacity.

🔁 Share this with anyone using Hedera, NFTs, or non-custodial wallets.

====================================

Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!

Because 70% of all cyberattacks target small businesses—

I can help protect yours.

#CyberSecurity #CryptoScam #NFTFraud #ManagedITServices #Web3Security

Tips
News
Cybersecurity

United Airlines’ ambitious rollout of free Starlink Wi-Fi has just encountered unexpected headwinds

•
20 min read

🛰️ Starlink Hits Turbulence: United Temporarily Shuts Down Wi-Fi on Regional Jets

United Airlines’ ambitious rollout of free Starlink Wi-Fi has just encountered unexpected headwinds.

Onboard connectivity has been shut down across all of United’s Embraer E175 regional jets equipped with Starlink—after pilots reported radio interference with critical aircraft communications.

The source? Static affecting VHF radios, which pilots use to talk with air traffic control.

What Happened?

United had recently installed Starlink antennas on nearly two dozen E175 aircraft. But shortly after deployment, pilots began noticing static and interference on their comms systems, prompting United to disable Starlink in-flight internet out of caution.

According to the airline:

  • Starlink does not pose a flight safety issue, but the interference requires fixing

  • United and Starlink have identified a solution and are rolling it out during regular maintenance cycles

  • Roughly one-third of affected planes have already been fixed and are back online

Why This Matters for Business and IT Leaders

At Gigabit Systems, we help companies evaluate real-world applications of satellite and emerging technologies—and this case is a strong reminder that:

✅ “Plug-and-play” rarely works at aviation or enterprise scale

✅ Interference isn’t always digital—it can be radio frequency (RF) based

✅ Even robust tech like Starlink needs fine-tuning for safety-critical environments

Whether you’re integrating IoT sensors, wireless comms, or remote connectivity into your operations, testing for side effects like cross-channel interference is vital.

What’s Next?

United plans to:

  • Resume full Starlink Wi-Fi service on the E175 fleet within weeks

  • Expand Starlink installs to 40 more E175s and the CRJ-550 fleet

  • Keep retrofitting its entire regional jet fleet by end of year

  • Offer free internet access via Starlink for MileagePlus members—no additional cost

The Bigger Lesson

Innovation isn’t just speed. It’s stability.

If your business is investing in satellite connectivity, Starlink, or any high-bandwidth wireless tech—don’t skip RF testing, compliance checks, or environment-specific tuning.

👇 Comment if you’ve experienced issues integrating wireless or satellite tech.

🔁 Share with a business or travel exec curious about Starlink’s commercial impact.

====================================

Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!

Because 70% of all cyberattacks target small businesses—

I can help protect yours.

#Starlink #SatelliteTech #CyberSecurity #ManagedITServices #WiFiInnovation

Tips
News
Cybersecurity

Musk vs. Cook: The $5B Satellite Standoff That Changed Mobile Forever

June 8, 2025
•
20 min read

🚀 Musk vs. Cook: The $5B Satellite Standoff That Changed Mobile Forever


Elon Musk gave Apple 72 hours to pay $5 billion. Tim Cook said no. So Elon followed through.


Three years ago, Musk demanded that Apple integrate Starlink into its devices or face direct competition. Apple refused—and now, ironically, iPhones still connect to Starlink’s satellites… just not through Apple.


“You have 72 What Happened?



Apple opted for a low-risk satellite partnership with Globalstar to power its SOS emergency satellite feature. Meanwhile, Musk launched Starlink Direct to Cell in partnership with T-Mobile, enabling:


  • Full internet connectivity from space

  • Messaging, calling, and even social media—no tower needed

  • Compatibility with any phone, including iPhones (as long as you’re on T-Mobile)



Today, Musk’s space-based network is rapidly expanding—already active in regions like Chile and Peru, with broader coverage coming soon.



Why This Is a Masterclass in Strategy (and Risk)



At Gigabit Systems, we work with organizations that face similar (but scaled-down) dilemmas every day:


  • Should you embrace disruptive tech, or wait for market stability?

  • Should you partner with bold, visionary vendors—or keep things boring and safe?

  • Is control more important than innovation?



Apple chose safety. Musk chose scale.

Now Apple may be playing catch-up.



What This Teaches Businesses, Schools, and Healthcare Leaders



✅ Risk-averse partnerships avoid drama—but may also miss revolutions

✅ Connectivity is evolving faster than mobile carriers can adapt

✅ Your next IT provider might be a space company

✅ Vendor relationships aren’t just tech—they’re philosophy



Your Turn



Are your technology partnerships driving innovation or avoiding disruption?


👇 Comment if you’ve ever hesitated to adopt new tech due to vendor risk.

🔁 Share with a colleague choosing between two competing providers.



====================================


Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!



Because 70% of all cyberattacks target small businesses—

I can help protect yours.





#DigitalStrategy #Starlink #TechLeadership #ManagedITServices #InnovationVsRisk




Tips
Cybersecurity
News

FBI Alert: Ransomware Surge

June 8, 2025
•
20 min read

🔥 FBI Alert: Ransomware Surge Hits 900+ Organizations — Is Yours Next?

The FBI and CISA just dropped a critical cyberattack advisory.

Play ransomware is exploding in volume — with over 900 confirmed victims in just one wave of attacks. Healthcare providers, law firms, schools, and SMBs are all in the crosshairs.


This isn’t just noise. It’s a national-level security bulletin, and your business should act right now.



What is Play Ransomware?


Play is a sophisticated, stealthy ransomware threat believed to be linked to North Korea’s Andariel group, distributed via the cybercrime group Balloonfly.


🧨 Here’s what makes Play so dangerous:


  • Victims receive no ransom amount, only a custom email address
  • Attackers may call the victim directly to pressure payment
  • They use remote access services, like RDP and VPN, to get in
  • Known to exploit zero-day Windows and Fortinet vulnerabilities



Once inside, they move fast:

🛠️ Cobalt Strike

🛠️ PsExec

🛠️ Mimikatz

🛠️ SystemBC

📂 Lateral movement, admin privilege escalation, encryption, and exfiltration



Which Vulnerabilities Are Being Exploited?



  • CVE-2025-29824 – Windows CLFS (patched in April 2025)
  • CVE-2022-41040 / 41082 – Microsoft Exchange Server
  • CVE-2020-12812 / 2018-13379 – Fortinet FortiOS


What the FBI Says You Must Do Immediately:


At Gigabit Systems, we’re helping organizations deploy these critical mitigation tactics today:


✅ Maintain segmented, offsite backups

✅ Enforce MFA everywhere

✅ Set strong password policies (15+ characters)

✅ Lock down after multiple failed logins

✅ Block unused ports and email links

✅ Require admin rights for software installs

✅ Patch immediately — OS, firmware, and apps

✅ Disable PowerShell and scripting tools unless essential

✅ Log and monitor unusual command-line behavioris isn’t just about cyber hygiene anymore. This is survival strateg

If You Think You’re Too Small to Be Targeted…

Ask any of the 900+ confirmed victims — most didn’t think they were either.


🔁 Share with any colleague running unpatched Exchange, Fortinet, or Windows services.



Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!


Because 70% of all cyberattacks target small businesses—

I can help protect yours.

#CyberSecurity #Ransomware #FBIAlert #ManagedITServices #DataProtection

News
Cybersecurity
Tips

Google Chrome users—especially businesses—face a new and dangerous risk.

June 6, 2025
•
20 min read

🧨 Sound the Alarm: These Chrome Extensions Are Sleeper Threats

Google Chrome users—especially businesses—face a new and dangerous risk.

A silent network of malicious Chrome extensions has just been exposed, potentially impacting millions.

According to cybersecurity researchers at LayerX, four extensions are actively masquerading as sound tools while quietly waiting to execute malicious code.

These are the extensions you should delete

immediately

:

  • Sound Booster
  • Examine source code of Volume Max – Ultimate Sound Booster
  • Volume Master: Master Your Sound
  • Volume Booster: Ultimate Sound Enhancer

These aren’t your everyday privacy nuisances—they’re sleeper agents built by a coordinated developer or group, with shared code and links to known malicious domains.

Why Should Small Businesses Care?

Most SMBs don’t restrict browser extensions across their teams. If even one employee installs a rogue plugin, your entire network could be exposed. These extensions can:

  • Steal cookies, saved passwords, and session data
  • Bypass endpoint detection tools
  • Act like modern botnets, but from within your employee’s browser

What Can You Do Right Now?

At Gigabit Systems, we help small and midsize companies stay ahead of zero-day threats like this one.

Here’s what we recommend—starting today:

✅ Review all installed browser extensions across devices

✅ Block Chrome Web Store access through admin settings

✅ Enforce browser isolation policies for sensitive apps

✅ Deploy real-time browser protection and monitoring tools

✅ Conduct regular cybersecurity training—employees are your first firewall

Don’t Wait for a “Marching Order”

These sleeper extensions haven’t “activated” yet—but when they do, it’s too late to contain the damage. The time to harden your defenses is now, not after the breach report.

👇 Comment if you’d like a free audit of browser vulnerabilities across your team.

🔁 Share with a business owner who relies on Chrome daily.

====================================

Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!

Because 70% of all cyberattacks target small businesses—

I can help protect yours.

#CyberSecurity #ChromeExtensions #ManagedITServices #MSP #SmallBusinessSecurity

‍

Cybersecurity
News
Tips

No Password, No Encryption, No Protection

June 6, 2025
•
20 min read

💥 Massive Data Breach Exposes 184 Million Passwords in Plain Text

‍

🛑 No Password, No Encryption, No Protection

A cybersecurity researcher has uncovered a staggering data breach exposing over 184 million login credentials—sitting in an open, unprotected database accessible to anyone online. This breach is one of the largest of its kind in recent history.

The exposed database included sensitive credentials for platforms such as:

  • Google, Microsoft, Facebook, Snapchat, Apple
  • Banking and financial institutions
  • Medical services and government portals
📂 The file was publicly accessible. No exploit required. No password protection. Just a URL and a browser.

🕵️ How Was It Discovered?

Cybersecurity expert Jeremiah Fowler found the open database during a routine scan of exposed assets. Inside:

  • Email addresses
  • Passwords
  • Usernames
  • Linked URLs
  • All visible in plain text.

Fowler believes the data was likely harvested using infostealer malware, which silently extracts private information from infected devices. The origin of the breach remains unknown, and the database was removed shortly after being reported.

✅ What You Should Do Immediately

If you think your data might be affected, act now. Here’s how to protect yourself:

1. Change Your Passwords

Use unique, strong passwords across every platform. Avoid using slight variations of old passwords.

2. Enable Two-Factor Authentication (2FA)

This adds an extra layer of protection—even if your password is compromised.

3. Watch for Suspicious Activity

Review login history and look for unfamiliar devices or locations.

4. Use a Password Manager

A top-rated password manager can help you generate strong credentials and monitor for breaches.

5. Don’t Click Suspicious Links

Phishing attempts often follow breaches. Always go directly to a site instead of using emailed links.

6. Keep Your Software Updated

Enable auto-updates on your OS, apps, and security tools to patch known vulnerabilities.

🔒 Security Is a Shared Responsibility

While cybercriminals are to blame, many companies are still neglecting basic security hygiene—like encrypting user data or applying access controls. With AI, quantum computing, and global connectivity reshaping the landscape, these oversights are unacceptable.

📢 Join the Conversation

Are companies doing enough to protect your data?

📬 Get More Like This:

‍

‍

News
Cybersecurity
Tips

Think before you paste. Your computer — and data — could depend on it.

May 29, 2025
•
20 min read

🚨 Think before you paste. Your computer — and data — could depend on it.

I recently stumbled across a suspicious website posing as a legitimate Cloudflare verification page. But instead of the usual CAPTCHA or browser check, it prompted this:

1. Press Windows + R
2. Paste a PowerShell command
3. Press Enter

The command pointed to an external script hosted at https://draffeler.com/cf/afs.txt — and that’s a huge red flag. This method is a classic trick used to deliver malware or steal sensitive data.

🔒 Here’s the rule:

Never run random commands from a website. Especially when they ask you to use PowerShell or Command Prompt.

Even if the site looks legit — if it’s telling you to copy-paste code, assume it’s a trap.

What makes this even more dangerous is that it masquerades as a routine security check — leveraging a brand like Cloudflare to build false trust.

If you see anything like this:

✅ Exit the site immediately

✅ Don’t enter any commands

✅ Report it to your IT team or security provider

The best defense is awareness.

The worst mistake is assuming “this looks official.”

Stay sharp. Stay skeptical. Stay secure.

====================================

Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!

#CyberSecurity #Phishing #Malware #OnlineSafety #InfoSec #PowerShell #SecurityAwareness #CloudflareScam

‍

News
Cybersecurity
Tips

ipad finally gets an app for whatsapp

May 28, 2025
•
20 min read

After 15 years… it’s finally here.

WhatsApp — one of the world’s most downloaded messaging apps — now has a dedicated iPad app.

✅ Optimized for the larger screen

✅ Supports video & audio calls (up to 32 people)

✅ Fully cross-platform (iOS + Android)

✅ Takes full advantage of iPadOS multitasking (Split View, Slide Over, Stage Manager)

Why does this matter?

For starters, WhatsApp isn’t just a personal chat tool anymore. It’s become a mission-critical communication platform for businesses, global teams, and cross-platform collaboration. And now, it works natively on a device many professionals rely on for travel, meetings, and multitasking.

📱 Unlike Apple’s Messages app, WhatsApp is platform-agnostic — making it ideal for group chats, business communications, and international messaging.

🧳 And for frequent travelers? This is a game-changer.

With this long-overdue move, Meta is signaling that it’s finally treating the iPad as a primary work device — and maybe (just maybe) we’ll see an Instagram iPad app next?

You can grab the new WhatsApp iPad app in the App Store today.

====================================

Follow me for mind-blowing information and cybersecurity + tech news. Stay ahead of the curve!

#TechNews #WhatsApp #iPadApps #Messaging #Meta #Productivity #CrossPlatform #BusinessCommunication

‍

Previous
Next
About
Managed ServicesCybersecurityOur ProcessWho We AreNewsPrivacy Policy
Help
FAQsContact UsSubmit a Support Ticket
Social
LinkedIn link
Twitter link
Facebook link
Have a Question?
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Copyright © {auto update year} Gigabit Systems All Rights Reserved.
Website by Klarity
Gigabit Systems Inc. BBB Business Review