New Security Warning for Chrome Users Using 2FA

Cybersecurity is an ongoing battle, and every day, new threats emerge that put our data and privacy in jeopardy. Recently, a significant vulnerability was discovered within Google Chrome’s 2FA security and cookie protection features. A new hacking tool, capable of breaking these defenses, has placed Chrome users, especially businesses, at increased risk. At Fusion Cyber […]

Here’s Why Hackers Are Getting the Upper Hand!

In cybersecurity, relying solely on traditional defenses like antivirus (AV) or even endpoint detection and response (EDR) is a risk businesses can no longer afford. Attackers continue to refine tools, making it disturbingly easy to disable or evade these protective systems. Recently, a ransomware toolkit, Poortry (also known as BurntCigar), demonstrated just how vulnerable EDR […]

Top Best Practices for Event Logging & Threat Detection in 2024

The National Security Agency (NSA) has released its latest best practices for event logging and threat detection in 2024, targeting cloud services, enterprise networks, mobile devices, and operational technology (OT) networks. In collaboration with international bodies like Australia’s Cyber Security Centre, these guidelines offer crucial insights for enhancing organizational resilience against ever-evolving cyber threats. Why […]

Data Breach Victims Surge Over 1,100%: Are You the Next Target?

Data breach victims soar. Shield your info: use strong passwords, enable 2FA, update software, avoid shady links, limit online sharing.

Why Are Data Breaches Skyrocketing? Data breaches have become alarmingly common in 2024. In just the first half of the year, we’ve witnessed some of the largest cyberattacks yet, targeting major companies like Ticketmaster, Advance Auto Parts, and Dell. To put this into perspective, the number of data breach victims in the second quarter of […]

How Session Hijacking 2.0 Bypasses MFA — And What Canadian SMBs Must Do Now

What You Need to Know Now Session Hijacking 2.0 is the modern twist on account takeover (ATO): attackers don’t need your password once they have your session. When you sign in to cloud services like Microsoft 365, Google Workspace, Salesforce, or Slack, the service issues session cookies and OAuth tokens that keep you signed in. […]

Protecting Your SMB: Where to Start & How an MSSP Can Help

In today’s digital age, small and medium-sized businesses (SMBs) face an increasing number of cyber threats. With cyberattacks becoming more sophisticated, it’s no longer a question of if a business will be targeted but when. For many SMBs, the challenge begins with a fundamental issue: where to start with cybersecurity. Complicating matters, many business owners […]

Global IT Outage Disrupts Operations Across Industries

In today’s digital age, the convenience of sharing emails and links with contacts comes with alarming risks. A recent survey reveals that a substantial percentage of devastating data breaches are caused by the careless sharing of emails and links. This blog post passionately explores why it’s crucial to be extremely cautious when sharing emails and links, as they may contain sensitive information or lead to dangerous and malicious websites.