BIO:

CEO, YouAttest.com

Articles and Comments By Garret F. Grajek

Expert Commentary
97% Of Top Universities Can't Secure Email Domains – Expert Comments
August 04 , 2022 by Garret F. Grajek
Higher education isn't the only sector at risk from email attack. The US Cybersecurity & Infrastruct...
Expert Commentary
Neopets Data Breach Exposes Personal Data Of 69 Million Members
July 22 , 2022 by Garret F. Grajek
“The fact that NeoPets, a site on no one’s identity hit list, got attacked should be a warning t...
Expert Commentary
AiTM Phishing Campaign Targets +10,000 Orgs Since 2021 - Expert Comments
July 15 , 2022 by Garret F. Grajek
“Phishing is still the #1 attack vector with identities being their primary target. An identity i...
Expert Commentary
NFT Giant OpenSea Reports Major Email Data Breach
July 01 , 2022 by Garret F. Grajek
“The world of crypto is already know for massive fraud and theft. The practice and procedures enac...
Expert Commentary
Kubernetes API: Over 900,000 Exposures Found Across The Internet
June 29 , 2022 by Garret F. Grajek
Misconfigurations are the key attack vector in which hackers are penetrating and staying resident in...
Expert Commentary
Russian Botnet Disrupted In International Cyber Operation – Expert Comments
June 20 , 2022 by Garret F. Grajek
Botnets are a major international concern - and one of the major problems facing internet availabili...
Expert Commentary
24 Billion Usernames And Passwords Found On The Dark Web
June 17 , 2022 by Garret F. Grajek
Identities are the true hackers objective. A username/password tuple can be attempted at not just th...
Expert Commentary
API Calls Expose 770M Logs With GitHub, AWS, Docker Tokens In Travis CI Logs
June 16 , 2022 by Garret F. Grajek
It is a false assumption that code and agents we implement in our enterprises are safe from malware....
Expert Commentary
IRS "Dirty Dozen" Warns Tax Pros And Businesses Of Spear Phishing
June 14 , 2022 by Garret F. Grajek
Phishing has become the #1 way to penetrate both user and corporate devices. The ease with which the...
Expert Commentary
What Are Top Threats To The Cloud Computing?
June 13 , 2022 by Garret F. Grajek
There is no question there is a crisis in cloud administrative privileges. The Palo Alto Unit 42 sur...
Expert Commentary
Why Shields Health Care Group Suffers Data Breach? Expert Weighs In
June 08 , 2022 by Garret F. Grajek
The key to remember here is the collaboration and integration of hacking components and groups. One...
Expert Commentary
Evasive Bots Driving Online Fraud: 2022 Report
May 22 , 2022 by Garret F. Grajek
It should alarm anyone who is involved in IT that 28% of the global resources for handling web traff...
Expert Commentary
Tesla “Phone-as-a-Key” Passive Entry Vulnerable To Relay Attacks – Expert Comments
May 18 , 2022 by Garret F. Grajek
Software has as many holes controlling a h/w device as it does controlling a s/w appliance like a we...
Expert Commentary
Kaspersky: 9 Of 10 Orgs Previously Hit With Ransomware Would Pay If Targeted Again
May 17 , 2022 by Garret F. Grajek
The fact that 88% of businesses would choose to pay the ransomware shows that the IT security commun...
Expert Commentary
Google & Other RTB Companies Behind 'Biggest Data Breach Ever Recorded'
May 17 , 2022 by Garret F. Grajek
Data is the new coal - furnacing the most important world industry - commerce. How this data is coll...
Expert Commentary
FBI, CISA, And NSA Warn Of Hackers Increasingly Targeting MSPs
May 12 , 2022 by Garret F. Grajek
This should be no surprise to those who follow CyberSecurity. The hackers go where the gold is. The...
Expert Commentary
Lincoln College To Close Permanently After Cyberattack – 5 Cyber Experts Comment
May 12 , 2022 by Garret F. Grajek
Identities are the \"gift that keeps on giving\" to hackers. And schools (like hospitals, government...
Expert Commentary
31,000 FTSE 100 Logins Found On Dark Web
May 11 , 2022 by Garret F. Grajek
This is a serious breach. There are most likely identities that include users w/ privileged access -...
Expert Commentary
HHS Information Security Program 'Not Effective'
May 06 , 2022 by Garret F. Grajek
The negative report on the state of security for the HHS is indicative of a larger problem and belie...
Expert Commentary
Grindr User Data For Sale, Expert Reaction
May 02 , 2022 by Garret F. Grajek
In America we haven\'t even touched the level of data privacy and data governance that the Europeans...
Expert Commentary
Q1 Reported Data Compromises Up 14% Over 2021
April 15 , 2022 by Garret F. Grajek
The report confirms what everyone already knew - cyberattacks have become one of the major concerns...
Expert Commentary
CISA Alert - ICS Best Practices Against Known Russian Cyber Actors
March 28 , 2022 by Garret F. Grajek
CI (Critical Infrastructure) is under attack by the Russians and other concerns. The new recommendat...
Expert Commentary
Mobile App Data Found Exposing API’s & Data In 1,000’s Of Cloud Databases
March 18 , 2022 by Garret F. Grajek
APIs are everything in modern software. Processes talking to process is how most new software is con...
Expert Commentary
QNAP Warns Severe Linux Bug Affects Most Of Its NAS Devices
March 16 , 2022 by Garret F. Grajek
The vulnerability \"Dirty Pipe\" is all about gaining local access for the purpose of privilege esca...
Expert Commentary
What Caused The Ransomware Attack On Toyota? Experts Insight
March 15 , 2022 by Garret F. Grajek
Supplier attacks are real - and effect not just the supplier but the full chain of customers. Attack...
Expert Commentary
“noVNC” Allows MFA Bypass. Expert Reaction
February 24 , 2022 by Garret F. Grajek
The key takeaway is the 2FA is not the cure all. There is no question that 2FA helps in securing aga...
Expert Commentary
"LinkedIn" Phishing Attacks Up 232% In Feb
February 17 , 2022 by Garret F. Grajek
Hackers have been using social engineering to hack systems since the first hackers guessed at user\'...
Expert Commentary