Steven Sundermeier
Steven Sundermeier is the Owner of ThirtySeven4, a nationally-respected cyber security firm. You can visit his website at http://www.thirtyseven4.com/
Ministry Tech Leaders
How They Work: “Deepfakes” Are AI-Produced Digitally Manipulated Media
Deepfakes are AI-generated media that have been digitally manipulated to replace one person’s likeness convincingly with that of another. Examples of digitally manipulated viral deepfakes include high-profile celebrities like: Keanu Reeves, Tom Cruise, Jerry Seinfeld, and Donald Trump.
Ministry Tech Leaders
Remote Ransomware Tries, Tries Again
Infamous ransomware groups, such as Akira, BlackCat, DarkSide, LockBit, MedusaLocker, Ryuk and WannaCry are now using remote encryption more frequently than ever before.
Ministry Tech Leaders
Use Threat Hunting to Go on Cyber Security Offense
Thirtyseven4 EDR Security is on the brink of officially announcing its cyber security developments and enhanced Threat Hunting product-release.
Ministry Tech Leaders
Everest Ransomware Update from Thirtyseven4
According to recent data gathered by the Thirtyseven4 EDR Security ThreatLab team, the Everest ransomware group (alarmingly!) appears to have shifted focus.
Ministry Tech Leaders
MedusaLocker Malware Wreaking Havoc
MedusaLocker is a notorious strain of malware that employs a double extortion tactic in (1) stealing data before encryption, and then (2) rendering the victim’s data inaccessible until a ransom is paid.
Ministry Tech Leaders
The Timeless Nigerian Letter Scam
You can probably recognize the familiar (awkward) wording as belonging to a 419-fraud scheme or better known as the Nigerian letter scam.
Ministry Tech Leaders
Amazon Cyber Security Starts With YOU
Cybercriminals are not unintelligent about the data at Amazon, and have taken note of the (web) address where so many people (and their information and money) hang out. That means users need to be aware of the need for Amazon cyber security.
Ministry Tech Leaders
Journey Through the Steps of an Online Scam
Journey through the steps of an online scam, an attempted hack that was foiled (hopefully before any unsuspecting “winners” entered their credit card information).
Join our community of SUBSCRIBERS and be part of the conversation.
To subscribe, simply enter your email address on our website or click the subscribe button below. Don't worry, we respect your privacy and won't spam your inbox. Your information is safe with us.