8776363957
Connect with us:
LinkedIn link
Facebook link
Twitter link
YouTube link
Gigabit Systems logo
Link to home
Who We AreManaged ServicesCybersecurityOur ProcessContact UsPartners
The Latest News in IT and Cybersecurity

News

A cloud made of diagonal linesA cloud made of diagonal lines
A pattern of hexagons to resemble a network.
News

Did the Massive Bunker Busters work

June 25, 2025
•
20 min read

America Drops Massive Bunker Busters on Iran — But Did They Work?

In a dramatic escalation of the ongoing conflict between Israel and Iran, the United States launched “Operation Midnight Hammer” over the weekend, marking the first-ever use of its 30,000-pound Massive Ordnance Penetrator (MOP) in combat. These bunker-busting bombs were dropped by B-2 stealth bombers on three of Iran’s most fortified nuclear sites: Fordow, Natanz, and Isfahan.

While former President Trump declared the operation a complete success, early satellite imagery and U.S. intelligence suggest otherwise — indicating the attack may have only set Iran’s nuclear program back by a few months.

The Bomb vs. the Bunker

This high-stakes confrontation highlights a less visible but critical arms race — not between nations, but between materials: steel versus concrete.

For decades, military engineers have been refining bunker-busting weapons. Modern penetrators are made from hardened alloys like Eglin Steel, designed to punch through reinforced targets with minimal explosive payloads. But Iran, as well as other military powers, has been investing in the opposite side of the equation: Ultra High Performance Concrete (UHPC), a fiber-reinforced material capable of withstanding 40,000 psi — far beyond the strength of conventional concrete.

Military insiders believe that Iran’s underground bunkers may be fortified with UHPC or even more advanced layered concrete technologies such as Functionally Graded Cementitious Composite (FGCC), which combines hard outer shells, energy-absorbing middle layers, and anti-spall inner coatings. If confirmed, this would help explain the MOP’s limited effect on the nuclear facilities.

A History of Escalation

This isn’t the first time U.S. bunker-busting technology has been challenged. During the Gulf War in 1991, Iraq’s heavily fortified command centers required a crash program to build stronger bombs — leading to the infamous 5,000-pound BLU-113. Today’s MOP is the spiritual successor, and at 30,000 pounds, it’s nearly the largest weapon the U.S. can drop without resorting to nuclear payloads.

However, experts warn that even the MOP may not be enough.

Where Does the Arms Race Go From Here?

As military concrete gets tougher, steel-based bomb casings are hitting their physical limits. The future may lie in hypersonic penetrators — non-explosive missiles made from tungsten or similar materials, relying purely on kinetic energy to crack through hardened targets at speeds exceeding Mach 5. Some call them “rods from God.”

Alternatively, soft-target strategies may dominate. Rather than penetrate a bunker directly, attackers might aim to destroy entrances, communications lines, or surrounding infrastructure — rendering the facility inoperable without needing to physically break through.

Final Thoughts

Whether Iran’s bunkers survived the weekend’s attack remains unclear. But one thing is certain: in the shadowy competition between bombmakers and bunker builders, neither side holds permanent advantage. As concrete becomes “smarter” and more resistant, and as weapons systems evolve in size, material, and velocity, the balance continues to shift.

The world is watching — not just for explosions, but for what comes after the dust settles.

News
Cybersecurity
Tips

WhatsApp Banned from U.S. House Devices Due to Security Risks

June 24, 2025
•
20 min read

🚫 WhatsApp Banned from U.S. House Devices Due to Security Risks

‍

In a bold cybersecurity move, the United States House of Representatives has officially banned the use of WhatsApp on all government-issued devices.

An internal email from Catherine Szpindor, Chief Administrative Officer of the House, instructed staffers to remove WhatsApp from all mobile, desktop, and browser-based platforms. The decision comes after the Office of Cybersecurity flagged WhatsApp as a “high risk” application, citing:

  • Lack of transparency around data handling practices
  • No encryption for stored data
  • Potential vulnerability to surveillance and breaches

This aligns with earlier Congressional bans on apps like DeepSeek, ByteDance products (e.g., TikTok), and even ChatGPT, due to data privacy and national security concerns.

💬 Why This Matters for the Private Sector

While the ban applies to federal staff, the concerns raised echo issues every business should consider when choosing communication tools. For example:

  • End-to-end encryption only covers live message transit—not cloud backups.
  • Meta’s track record on privacy has made regulators uneasy for years.
  • Group chats and media files often reside unencrypted in cloud backups, posing risks if endpoints are compromised.

If U.S. lawmakers are banning an app like WhatsApp, should your company be relying on it for client communications or sensitive data?

✅ Safer Alternatives Permitted

The House has endorsed platforms with stronger security protocols and transparency, including:

  • Signal
  • Wickr (by Amazon)
  • iMessage / FaceTime
  • Microsoft Teams

These platforms either offer full end-to-end encryption or are supported by organizations with clearer security frameworks and controls.

‍

Tips
News
Cybersecurity

NSA says one of the best ways to protect your phone from spyware is…

June 24, 2025
•
20 min read

Turn It Off to Shut Hackers Out

The NSA says one of the best ways to protect your phone from spyware is… turning it off and back on.

Surprised? You’re not alone. But in a recent advisory, the National Security Agency urged mobile users — especially those at risk of targeted attacks — to power cycle their smartphones at least once per week. It’s a surprisingly effective tactic against a growing wave of silent, zero-click malware that can hijack your phone without you clicking a single thing.

What Are Zero-Click Exploits?

These attacks exploit hidden software vulnerabilities to silently infect your phone. No downloads. No phishing links. No clues.

Once compromised, attackers can:

  • Spy on calls, messages, and emails

  • Steal passwords and MFA tokens

  • Track your location

  • Access corporate data via synced accounts

Why This Matters for Small Businesses

Most business owners rely on mobile phones for email, client chats, file sharing, and login verification.

If a device is compromised:

  • Hackers can pivot into your cloud accounts (Microsoft 365, Google Workspace, etc.)

  • Phishing campaigns can be launched from your account

  • Stored credentials and business data are exposed

  • You may not even realize it’s happening

A breached phone is more than a privacy issue — it’s a backdoor into your business.

NSA’s Top Tips for Mobile Security

The NSA and FCC recommend the following measures:

✅ Restart your phone once a week – disrupt memory-resident spyware

✅ Enable automatic software updates – patch vulnerabilities quickly

✅ Use a strong 6+ digit PIN and auto-lock after 5 minutes

✅ Never jailbreak or root your device – you’re disabling key protections

✅ Turn off Bluetooth and Location when not in use

✅ Avoid public Wi-Fi and charging stations – they can be tampered with

✅ Enable 2FA on all key accounts – especially email and financial

✅ Be wary of social engineering – especially calls or texts posing as support

Good Habits That Take Seconds

Restarting your phone weekly won’t solve everything — but it’s fast, easy, and disrupts many forms of malware.

And when layered with strong passwords, endpoint protection, and training, it’s one more barrier between attackers and your network.

70% of all cyber attacks target small businesses. I can help protect yours.

#cybersecurity #smallbusinesssecurity #mobilesecurity #infosec #manageditservices

Tips
Cybersecurity
News

16 Billion Logins Leaked - what this means to you

June 24, 2025
•
20 min read

🔐 16 Billion Logins Leaked: Why This Massive Breach Should Terrify Every Business Owner

A newly discovered trove of 16 billion stolen credentials has sent shockwaves through the cybersecurity world. Discovered by researchers at Cybernews, this massive breach isn’t just an archive of old, recycled data — it’s a blueprint for targeted cybercrime that’s unfolding in real time.

While a previous breach in 2024 exposed 26 billion records, what makes this latest leak so dangerous is the structure, freshness, and accessibility of the data. Spread across 30 unsecured databases accidentally left online, the breach includes not only usernames and passwords, but also session cookies, authentication tokens, and metadata that can bypass even multi-factor authentication (2FA).

🧠 Why Should This Matter to You?

Because this isn’t just some abstract, corporate security concern. This leak threatens everyday individuals, freelancers, small businesses, schools, healthcare offices, and law firms — especially those with limited IT infrastructure and little to no cybersecurity training.

🔓 What Can Hackers Do With a Stolen Password?

Let’s break it down.

1.

Credential Stuffing

When people reuse passwords across different sites (a very common mistake), hackers can take a login from one service (like Netflix or Gmail) and try it on other sites like:

  • Bank logins

  • Amazon or eBay accounts

  • Business email platforms (Microsoft 365, Google Workspace)

  • Payroll and accounting software (QuickBooks, Gusto)

Example: A small business owner uses the same password for their Shopify store and personal email. A hacker finds the credentials in the breach and logs into the email, resets the Shopify password, takes control of the store, and reroutes payouts.

2.

Account Takeover (ATO)

If an attacker can gain access to one critical account — like an email — they can quickly take over multiple systems. Why? Because your email inbox is the gateway to password resets for almost every online service.

Example: An attacker logs into your email, resets your 2FA-enabled bank account, and drains it. They also reset your Dropbox, downloading sensitive legal documents or client information.

3.

Phishing & Impersonation

With access to real login data, hackers can impersonate employees or business owners, launching targeted phishing attacks within your organization or against your clients.

Example: An attacker sends a spoofed invoice to a law firm’s clients from the actual paralegal’s email account, tricking clients into wiring money to a fraudulent account.

4.

Session Hijacking via Cookies

This breach includes session cookies, which are like digital keys left under your doormat. With them, attackers may not even need your password.

Example: You’ve secured your account with 2FA, but if a hacker steals your cookie data (especially if you’ve logged in from an infected browser), they can bypass security and access your session as if they were you.

5.

Targeting Small Business Vendors

Most small businesses rely on third-party tools — for invoicing, marketing, inventory, etc. If any of those are compromised, the attacker may gain indirect access to your data.

Example: A breached account on Canva or Mailchimp lets a hacker send out malicious newsletters from your business. One click by a customer, and malware is deployed.

🛡️ Why Small Businesses Are the Easiest Targets

Unlike large corporations, most small businesses don’t have:

  • Dedicated security teams

  • Endpoint protection across all devices

  • Formal cybersecurity training

  • Centralized password management or policies

This makes them low-hanging fruit for attackers, especially in credential-based breaches. Once one small business is breached, attackers often pivot laterally to vendors, clients, and supply chain partners — expanding the damage exponentially.

📋 What Can You Do

Right Now

to Protect Yourself?

✅ 1.

Stop Reusing Passwords

Use a password manager like 1Password, Keeper, Bitwarden, or Dashlane to generate unique, strong passwords for every account.

✅ 2.

Change Critical Logins Immediately

Prioritize your:

  • Email

  • Bank and payment accounts

  • Cloud storage

  • Business platforms (e.g., Square, QuickBooks, Shopify)

✅ 3.

Enable 2FA Everywhere

Use apps like Authy or Google Authenticator instead of just SMS codes. This gives an extra layer of security even if your password leaks.

✅ 4.

Run a Malware Scan

Install or update antivirus software to scan for infostealer malware, which may be the source of stolen credentials.

✅ 5.

Check for Breaches

Use https://haveibeenpwned.com to see if your email or password has been compromised.

💥 Final Thought: You Don’t Have to Be Paranoid — Just Prepared

Cybersecurity isn’t about locking everything down and living in fear. It’s about raising your defenses enough that hackers move on to easier targets. Most attacks are opportunistic. With a few smart steps — unique passwords, 2FA, basic hygiene — you make yourself a much harder target.

This 16-billion-record breach is a wake-up call. Will you hit snooze, or will you take action?

Cybersecurity
Travel
Tips
News

Homeland Security Warns of Increased Domestic Threats Amid Iran-Israel Conflict

June 24, 2025
•
20 min read

Homeland Security Warns of Increased Domestic Threats Amid Iran-Israel Conflict

The U.S. Department of Homeland Security (DHS) has issued a new National Terrorism Advisory System (NTAS) Bulletin warning of elevated threats to the United States in light of the ongoing Iran-Israel conflict. The bulletin highlights a concerning rise in cyberattacks, foreign influence operations, and the potential for domestic violent extremism motivated by geopolitical developments.

Cyber Threats on the Rise

The DHS warns that pro-Iranian hacktivists and Iranian government-affiliated cyber actors are actively targeting U.S. networks and internet-connected devices. These operations may include data breaches, service disruptions, or the hijacking of poorly secured systems. The advisory emphasizes that Iran maintains a long-standing willingness to retaliate through cyber means—particularly against entities associated with the U.S. government, which it holds accountable for the 2020 killing of an Iranian military commander.

Risk of Domestic Violence Increasing

A key concern addressed in the bulletin is the potential for homegrown violent extremists (HVEs) to act in response to calls from Iranian leadership or foreign terrorist organizations (FTOs). DHS notes that a religious ruling or fatwa issued by Iranian authorities calling for retaliatory violence could dramatically increase the threat of lone-actor attacks within the homeland.

Several domestic plots tied to Iranian-backed networks have already been thwarted since 2020, according to U.S. law enforcement. Some of these threats targeted critics of the Iranian regime residing in the United States, while others involved more lethal ambitions.

Terrorist Propaganda and Hate Crime Threats

The bulletin highlights recent propaganda from foreign terrorist groups such as HAMAS, Hezbollah, the Houthis, and the Popular Front for the Liberation of Palestine, some of which have openly called for attacks on U.S. interests in retaliation for American support of Israel. DHS warns that these calls for violence, along with widespread media coverage, may embolden supporters to conduct unsanctioned attacks.

Additionally, the current conflict may lead to a rise in hate crimes and targeted violence against Jewish, pro-Israel, or U.S.-government-affiliated individuals or institutions.

What You Can Do

DHS urges the public and private sectors to remain vigilant and report any suspicious activity. Recommended actions include:

  • Listening to local authorities and public safety officials

  • Implementing cybersecurity best practices as outlined by the Cybersecurity and Infrastructure Security Agency (CISA)

  • Participating in threat reporting efforts via the Nationwide Suspicious Activity Reporting (SAR) Initiative

  • Utilizing platforms such as FBI Field Offices, Fusion Centers, or the If You See Something, Say Something® initiative to report credible threats

The bulletin will remain in effect through September 22, 2025, at 11:59 p.m. ET.

Stay Aware. Stay Secure.

The message is clear: while military battles are being fought overseas, cyber and ideological battles may reach U.S. soil in the form of disruptive hacks, disinformation campaigns, and potentially deadly acts of domestic terrorism. Awareness, preparation, and prompt reporting remain the nation’s best tools for prevention.

Cybersecurity
News
Tips

How to Know If You’ve Been Hacked — And What to Do Next

June 26, 2025
•
20 min read

🛑 How to Know If You’ve Been Hacked — And What to Do Next

‍

From emails to routers to smartphones — here’s how to spot the red flags and reclaim your security.

The average person now uses hundreds of online accounts and multiple devices. Each one is a potential door for cybercriminals. And for businesses, that risk multiplies across teams, locations, and vendors.

At Gigabit Systems, we help businesses recognize and respond to digital threats. This guide gives you a plain-English breakdown of how to know if you’ve been hacked—and what to do next.

‍

🚨 General Signs You’ve Been Hacked

🔐 Passwords stop working

📩 Unexpected 2FA codes

📊 Unexplained financial transactions

📲 Unauthorized changes to devices or accounts

📨 Messages sent from your email or social media you didn’t write

‍

💻 Device Hacked? Here’s How to Tell:

Computer (PC or Mac)

  • Sluggish performance, freezing, crashing
  • Pop-up ads or unknown programs
  • You’re locked out of accounts or the system
  • Spam is sent from your device or business domain

‍

🛠 What to do:

Unplug. Run a full malware scan. Change all passwords. Restore from backup if needed.

Phone

  • Battery draining fast, device overheating
  • New apps, changes to security settings
  • Strange texts or login codes
  • Locked out of your Apple ID or Google account

🛠 What to do:

Run a security scan. Change passwords. If needed, wipe the phone and restore from a clean backup.

Wi-Fi Router

  • Internet is slow or erratic
  • You see unknown devices connected
  • DNS redirection or browser hijacking
  • Admin password has changed

🛠 What to do:

Factory reset. Set a strong admin password. Update firmware. Scan all connected devices.

📁 Account Hacked? Check for These Signs:

Amazon

  • Address, email, or payment method changed
  • Orders or reviews you didn’t make

Apple ID

  • Devices you don’t recognize
  • Unauthorized purchases from App Store or iTunes

Email

  • Password reset alerts
  • Missing emails, or contacts report strange messages

Google/Microsoft

  • Login attempts from unknown locations
  • Changes to personal data
  • Unauthorized access to Drive, Outlook, etc.

Netflix

  • Profile changes or sign-ins from unfamiliar devices
  • Locked out of account

💬 Social Media Platforms

Social media hacks spread scams and impersonation fast. Look for:

  • Posts or messages you didn’t send
  • New logins from other countries
  • Locked accounts or suspicious login attempts

🛡 Recover fast:

Change your password, enable MFA, review connected apps, and alert your contacts.

🧩 The Bottom Line

If it feels off—it probably is.

Don’t ignore signs like overheating phones, rejected passwords, or weird login alerts. The faster you respond, the more control you can retain.

🔐 Gigabit Systems Can Help:

We offer:

✅ Endpoint monitoring

✅ Cloud account audits

✅ 24/7 security alerting

✅ IT support for recovery

✅ Staff cybersecurity awareness training

👇 Comment if you’ve ever dealt with a hacked account or device.

🔁 Share this with a colleague or team that needs a refresher.

====================================

Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!

‍

‍

Because 70% of all cyberattacks target small businesses—

I can help protect yours.

‍

‍

#CyberSecurity #DataBreach #DeviceSecurity #ManagedITServices #MFA

‍

Travel
News
Tips
Cybersecurity

How Scammers Exploit Amazon Prime Day

June 23, 2025
•
20 min read

Prime Targets: How Scammers Exploit Amazon Prime Day

As Amazon prepares for its multi-day Prime Day event (July 8–11), cybersecurity experts are sounding the alarm. Scammers are already engineering new phishing campaigns, impersonating Amazon customer support to trick consumers into revealing sensitive account details.

Last year, Amazon reported an 80% spike in impersonation scams during Prime Day. This year’s threat landscape is expected to be worse.

🕵️‍♂️ The Favorite Tactics:

  • Fake phone calls about “suspicious” purchases (e.g., iPhones)

  • Phishing texts or emails claiming there’s a payment issue

  • Fake Amazon lookalike sites requesting logins

  • Urgent warnings designed to spark panic

🎯 Why it works: During big sales, shoppers are more distracted. Deals drop, but so does user vigilance. That’s when social engineering thrives.

💡 Amazon’s own advice includes:

  • Never share your login info with third-party tools or people

  • Never place orders or give payment info over the phone or email

  • Only trust the official Amazon app or website

  • Turn on Two-Factor Authentication (2FA)

  • Don’t fall for gift card payment requests — Amazon will never ask for this

🔐 Extra precautions:

  • Keep your OS and Amazon app updated

  • Use a unique password, not shared with other sites

  • Avoid clicking links — go directly to Amazon.com to check account issues

💥 Prime Day is open season for cybercriminals. You’re not just shopping for deals — you’re also being shopped as a target.

====================================

Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!

#Cybersecurity #AmazonPrimeDay #PhishingScams #OnlineSafety #2FA

Cybersecurity
News
Tips

Iran-Israel Conflict Sparks Global Cyber Threat

June 22, 2025
•
20 min read

The Cyber Frontline Just Expanded

Iran-Israel Conflict Sparks Global Cyber Threat — U.S. Critical Infrastructure in the Crosshairs

As tensions explode between Iran and Israel, cybersecurity experts are sounding alarms: America’s small businesses and infrastructure are next.

Researchers from Radware and Google’s Threat Intelligence Group warn that Iran-aligned cyber actors, emboldened by the growing military conflict, are preparing to strike — and they’re not alone. North Korea, China, and even Ukraine-linked groups are likely to exploit the chaos to unleash disruptive and destructive cyberattacks on soft targets across the U.S.

Who’s at Risk?

This isn’t just about governments or global corporations.

  • Small businesses

  • Schools

  • Healthcare operations

  • Law firms

All are considered soft targets — easy to breach, valuable to exploit, and often unprepared.

Recent patterns show that threat actors are increasingly going after:

  • Industrial systems

  • Third-party vendors

  • Privately owned utilities

  • Cloud-based infrastructure

One past incident saw Iranian hackers attack the U.S. water sector by exploiting vulnerabilities in Israeli-manufactured control equipment.

What You Need to Know

Iranian-linked attackers use tactics like:

  • Spear-phishing

  • Exploitation of unpatched systems

  • Destructive malware

  • Credential harvesting

  • Supply chain compromise

John Hultquist from Google warns that while Iranian cyber activity was once regionally focused, it’s now expanding globally, with U.S. companies firmly on the radar.

“These are sophisticated operators with strategic goals. Hacktivists are becoming cyber proxies, overlapping with state-sponsored agendas,” said Scott Algeier, director of the IT-ISAC and Food & Ag-ISAC.

What You Can Do Right Now

✅ Harden your infrastructure — patch now, not later

✅ Review vendor and supply chain cybersecurity posture

✅ Run internal phishing simulations and employee awareness training

✅ Deploy endpoint detection and response (EDR) tools

✅ Enable MFA across every account and service

✅ Monitor for suspicious outbound traffic or anomalies

✅ Prepare an incident response plan — and test it

Final Thought

The battlefield is digital, and the front line may run straight through your network. If you operate any form of critical service — especially in healthcare, education, law, or utilities — you are a target.

====================================

Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!

70% of all cyber attacks target small businesses. I can help protect yours.

Cybersecurity
News
Tips

Aflac Hit in Insurance Industry Hacking Spree

June 21, 2025
•
20 min read

Don’t Let the Spider Bite 🕷️

Aflac Hit in Insurance Industry Hacking Spree — Is Your Business Next

Another day, another breach — and this time, it’s big. Insurance giant Aflac has confirmed a cyber intrusion potentially exposing sensitive client data, including Social Security numbers, insurance claims, and health information.

This isn’t an isolated incident. In the last few weeks, Erie Insurance and Philadelphia Insurance Companies have also fallen victim to a coordinated wave of cyberattacks. The culprit? A young but aggressive threat actor group known as Scattered Spider, notorious for social engineering and lightning-fast infiltration.

What Happened?

Aflac, one of the largest providers of supplemental health insurance in the U.S., disclosed that attackers breached their systems using social engineering tactics — impersonating tech support staff to trick employees into giving up access.

Despite Aflac detecting and stopping the intrusion within hours (and reporting that no ransomware was deployed), the scale of potential exposure is massive. The FBI and cybersecurity experts are now urging all companies in the insurance and healthcare space to harden their defenses immediately.

Why This Matters for SMBs, Healthcare, Law Firms, and Schools

You don’t need to be a Fortune 500 company to become a target. Scattered Spider doesn’t discriminate — they’ve gone after casinos, retailers, schools, and now the insurance sector.

If your employees use weak passwords, skip MFA, or get tricked by a fake IT call, your entire business could be paralyzed in under 24 hours.

Imagine a school system locked out of student data. A law firm’s case files leaked. A small healthcare clinic’s patient records exposed. It’s not just embarrassing — it’s catastrophic.

What You Can Do Today

  • Train your staff to spot social engineering — no, that “tech support” caller isn’t who they claim.

  • Implement real-time threat monitoring and endpoint detection (EDR).

  • Enable MFA across all cloud and SaaS platforms.

  • Review your disaster recovery and incident response plan.

  • And please — ditch the “default” admin password.

Final Thought

This isn’t just about Aflac. It’s about every business that handles sensitive information. The next breach headline could have your name in it — unless you’re prepared.

====================================

Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!

70% of all cyber attacks target small businesses. I can help protect yours.

Previous
Next
About
Managed ServicesCybersecurityOur ProcessWho We AreNewsPrivacy Policy
Help
FAQsContact UsSubmit a Support Ticket
Social
LinkedIn link
Twitter link
Facebook link
Have a Question?
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Copyright © {auto update year} Gigabit Systems All Rights Reserved.
Website by Klarity
Gigabit Systems Inc. BBB Business Review