Entries by Chad Anderson

4 Secrets MSPs Should Know About Browser Security

As an MSP, it is your mission to provide your customers with tailored technology solutions and services that meet their specific needs and help them reach their business goals. Implementing security measures is an essential part of this, as it reduces the risk of cyber incidents. But what if implementing security measures not only increased the organization’s security posture but also saved you time and money? By investing in a comprehensive browser security tool, you can go beyond just protecting the edge.

Conceal Threat Alert: Hackers Mimicking ChatGPT to Spread Malware

A new malware, the ChatGPT Stealer, is targeting users of the AI-powered chatbot, ChatGPT, and stealing personal information from the infected user’s device. The attackers used the trusted reputation of ChatGPT to convince users to download a credential-stealing trojan that pretended to be a ChatGPT app.

ConcealBrowse – Demo

What is ConcealBrowse and how does it work? Check out this brief demo video to learn more about ConcealBrowse, our lightweight, secure browser extension that detects, defends and isolates malicious, unknown internet activity across all applications, leaving your organization’s users protected from ransomware and credential theft.

Why ConcealBrowse?

As the internet becomes an ever-growing part of our daily lives, with 65% of the population projected to be using it by 2023, cyber risks initiated in the browser are growing exponentially. To protect ourselves from these threats, we need browser extensions that focus on security and privacy. To address these issues, browser extensions such as ConcealBrowse are gaining traction. Taking a deep dive into browser security, we explore how ConcealBrowse works and its top 4 benefits.

Conceal Threat Alert: Coinbase Employee Compromised via SMS Phishing Attack

A recent cyberattack on cryptocurrency exchange Coinbase highlights the growing threat facing organizations. The attack was carried out by sending fake SMS messages that appeared to be from the company’s security team. However, these messages included malicious links that redirected employees to a phishing website, allowing attackers to take control of their accounts and access sensitive data.