Computer Security US Blog

Computer Security News and Insights

Identity Theft Protection

Identity Theft Protection for Businesses: A 2025 Guide

In January 2024, a single compromised employee credential at a mid-size financial services firm led to the theft of 4.3 million customer records. The breach cost the company $18 million in remediation, legal fees, and regulatory fines — and their brand reputation still hasn't recovered. That's

Carl B. Johnson Feb 28, 2025 7 min read
Cybersecurity Glossary

Cybersecurity Glossary for Beginners: 40 Terms You Need

When the Colonial Pipeline ransomware attack shut down fuel distribution across the U.S. East Coast in May 2021, millions of people suddenly needed to understand words like "ransomware," "threat actor," and "critical infrastructure." But most glossaries online read like they were written by

Carl B. Johnson Jan 06, 2025 8 min read
Malware

What Is Malware? A Security Pro's Field Guide for 2025

A Single Click Cost MGM Resorts $100 Million In September 2023, a threat actor called Scattered Spider used social engineering to trick an MGM Resorts help desk employee into resetting credentials. Within hours, they deployed malware across MGM's network — crippling hotel check-ins, slot machines, and digital room keys

Carl B. Johnson Jan 06, 2025 7 min read
Trojan Horse Malware

Trojan Horse Malware: How It Gets In and How to Stop It

In September 2023, MGM Resorts watched helplessly as its systems went dark — slot machines frozen, hotel check-ins offline, operations paralyzed for ten days. The estimated cost exceeded $100 million. The attack vector? Social engineering that led to credential theft, which opened the door for malware deployment across the enterprise. That&

Carl B. Johnson Dec 19, 2024 7 min read
Keylogger Attack

Keylogger Attack: How Hackers Steal Every Keystroke

In March 2024, security researchers at Fortinet uncovered a campaign distributing Snake Keylogger through phishing emails disguised as payment remittance notices. The malware silently captured credentials from over 280 banking and email applications before exfiltrating everything to attacker-controlled Telegram bots. The victims had no idea. Every password, every credit card

Carl B. Johnson Dec 19, 2024 6 min read
Man in the Middle Attack

Man in the Middle Attack: How Hackers Steal Data

In January 2024, security researchers at Sekoia documented a massive adversary-in-the-middle campaign that used phishing kits to intercept Microsoft 365 credentials and session tokens in real time — bypassing multi-factor authentication entirely. The attack wasn't theoretical. It hit thousands of organizations across multiple industries. And it reminded every security

Carl B. Johnson Dec 19, 2024 8 min read