Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

C2 provides technology services and consultation to businesses and individuals.

T (818) 584 6021
Email: [email protected]

C2 Technology Partners, Inc.
26500 Agoura Rd, Ste 102-576, Calabasas, CA 91302

Open in Google Maps
QUESTIONS? CALL: 818-584-6021
  • HOME
  • BLOG
  • SERVICES
    • Encryption
    • Backups
  • ABOUT
    • SMS Opt-In Form
    • Terms and Conditions
    • Privacy Policy
FREECONSULT
Tuesday, 19 January 2021 / Published in Woo on Tech

Who Protects the Protectors?

If you’ve used a computer – Windows or Mac – in the past 20 or so years, you’ve probably used a handy product called Malwarebytes. Once consider a scrappy bit of software us techs could whip out during the early days of malware infections, Malwarebytes has since “leveled-up” into a very successful security platform that still offers a useful, free version of its malware scanner. Unfortunately, their visibility in the market makes them a big target as well, and they just revealed that they have been compromised by the same hacking group that gutted SolarWinds.

What this means for you

According to Malwarebytes, unlike SolarWinds their products were not compromised but their email was hacked in the same manner. Even so, email is the lifeblood of any organization, so this is still a blow to their brand and to their internal morale. In their defense, the group responsible for the hack is credited with possibly one of the most devastating cyberattacks in history and it’s pretty evident we are only just starting to discover the breadth of their campaign which is conservatively estimated to include thousands of companies. These types of wounds (and scars) are earned on the front-lines of a war most of us don’t see, and it is at once disconcerting and strangely comforting that even the largest, best prepared organizations still fall victim to cyberattacks. This should not discourage you from making every effort to stay safe. If anything this should serve as a stark reminder that there are powerful forces aligned against ethical, honest people who are just trying to get some work done, and as such always allocate a healthy amount of resources and respect for security and backup for your technology infrastructure.

  • Tweet

What you can read next

Honda Hacked
Honda key fobs vulnerable to hack
MBIA
Poorly configured website exposes customer data
Bolster your vigilance with technology and expertise

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Business owner pressing an IT button with southern california in the background

    The Real Cost of Managed IT Services in Southern California (2026 Pricing Guide)

    Honest managed IT services in Southern Californ...
  • Person opening their email on a tablet

    Why Your Team Clicked That Phishing Email (And What It Really Means)

    I need to tell you something that might make yo...
  • Person typing on laptop with email showing and AI symbol

    AI Generated Phishing: Why Your Security Training Is Already Outdated

    Remember when you could spot a phishing email b...
  • Employees in a meeting, AI is present

    Shadow AI – The Security Risk Already Inside Your Company

    Your employees are using unauthorized AI tools ...
  • Email Credential Theft is Still Hot

    You would think that with all the money pouring...

Archives

  • GET SOCIAL
Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

© 2016 All rights reserved.

TOP