New Security Warning for Chrome Users Using 2FA

Cybersecurity is an ongoing battle, and every day, new threats emerge that put our data and privacy in jeopardy. Recently, a significant vulnerability was discovered within Google Chrome’s 2FA security and cookie protection features. A new hacking tool, capable of breaking these defenses, has placed Chrome users, especially businesses, at increased risk. At Fusion Cyber […]
Here’s Why Hackers Are Getting the Upper Hand!

In cybersecurity, relying solely on traditional defenses like antivirus (AV) or even endpoint detection and response (EDR) is a risk businesses can no longer afford. Attackers continue to refine tools, making it disturbingly easy to disable or evade these protective systems. Recently, a ransomware toolkit, Poortry (also known as BurntCigar), demonstrated just how vulnerable EDR […]
Top Best Practices for Event Logging & Threat Detection in 2024

The National Security Agency (NSA) has released its latest best practices for event logging and threat detection in 2024, targeting cloud services, enterprise networks, mobile devices, and operational technology (OT) networks. In collaboration with international bodies like Australia’s Cyber Security Centre, these guidelines offer crucial insights for enhancing organizational resilience against ever-evolving cyber threats. Why […]
Data Breach Victims Surge Over 1,100%: Are You the Next Target?

Why Are Data Breaches Skyrocketing? Data breaches have become alarmingly common in 2024. In just the first half of the year, we’ve witnessed some of the largest cyberattacks yet, targeting major companies like Ticketmaster, Advance Auto Parts, and Dell. To put this into perspective, the number of data breach victims in the second quarter of […]
How Session Hijacking 2.0 Bypasses MFA — And What Canadian SMBs Must Do Now

What You Need to Know Now Session Hijacking 2.0 is the modern twist on account takeover (ATO): attackers don’t need your password once they have your session. When you sign in to cloud services like Microsoft 365, Google Workspace, Salesforce, or Slack, the service issues session cookies and OAuth tokens that keep you signed in. […]
Protecting Your SMB: Where to Start & How an MSSP Can Help

In today’s digital age, small and medium-sized businesses (SMBs) face an increasing number of cyber threats. With cyberattacks becoming more sophisticated, it’s no longer a question of if a business will be targeted but when. For many SMBs, the challenge begins with a fundamental issue: where to start with cybersecurity. Complicating matters, many business owners […]
The Hidden Costs of Data Breaches: A Canadian Perspective

he frequency of data breaches in Canada has reached an all-time high, with 27,000 incidents reported annually, equating to nearly 75 breaches daily.
Hydro-Québec Falls Victim to Supplier Scam

In an unfortunate incident highlighting the growing threat of supplier scams, Hydro-Québec recently admitted to falling prey to a fraudulent scheme.
Global IT Outage Disrupts Operations Across Industries (continued)

During incidents like these, partnering with Fusion Cyber Group ensures that our customers are guided, assisted, and recovered with immediate support. Our team of cybersecurity experts provides 24x7x365 monitoring and…
Global IT Outage Disrupts Operations Across Industries

In today’s digital age, the convenience of sharing emails and links with contacts comes with alarming risks. A recent survey reveals that a substantial percentage of devastating data breaches are caused by the careless sharing of emails and links. This blog post passionately explores why it’s crucial to be extremely cautious when sharing emails and links, as they may contain sensitive information or lead to dangerous and malicious websites.