此处无法显示此内容
在领英 APP 中访问此内容等
Barricade Cyber Solutions is dedicated to helping businesses protect their livelihoods from cyber-attacks and recover from the damage done. Cyber-attacks can cause massive issues for businesses and send dedicated, hard-working business owners into turmoil, but Barricade Cyber Solutions knows how to mitigate the damage done by cyber-incidents and protect you from future threats. We understand the life-upending problems that cyber-attacks cause, and we don’t take any situation lightly. We've helped thousands of businesses recover lost, stolen, and leaked data all around the world - there’s no business we can’t help - whether it’s helping you resolve a cyber-attack or prevent future damage. We’re GIAC certified, too, so you can rest easy knowing we’re skilled at what we do and that we’re passionate about helping your business. With Barricade Cyber Solutions, your business is safe from cyber-attacks 24/7, 365. Eric founded IT-Simplified (now barricade cyber solutions) in 2012, with the goal of providing quality IT consulting services to Charleston and surrounding area. He has over 16 years of IT experience, holds a multitude of industry certifications. Whether you want to talk about building a plan to prepare for a future breach, or if you are experiencing a case of #ransomware now, don't wait. Call Eric Taylor and the team at Barricade Cyber Solutions today at 843-419-8284. Learn more at https://barricadecyber.com.
Barricade Cyber Solutions的外部链接
255 Farmington Rd
Suite 201
US,South Carolina,Summerville,29486
No one wants to think about a cyberattack taking down their business, but if you don't begin planning today you may not be able to reduce the impact of a breach when it happens. At Barricade Cyber Solutions, we are here to walk you through every step of the prevention planning process. Contact us today for a consultation at barricadecyber.com. #cyberattack #ransomware
Antisyphon Training powered by Black Hills Information Security presents the Red Team Summit, a free virtual conference for security professionals and enthusiasts. Join us this Wednesday from 11 AM - 4PM EDT with your co-host, Eric Taylor, CEO of Barricade Cyber Solutions. This isn't only for offensive security pros; it's a place for blue team to gain knowledge on how their adversaries operate. Did you know if you attend, you'll receive a Certificate of Completion worth 5 CPE credits? Register for free at https://lnkd.in/e6cvd3Xu. #redteam #blueteam #cybersecurity
Eric Taylor’s bringing the smoke!!
As the weather warms up, I always want to keep the smoker going. Today, I am making some beef jerky. After 42 hours marinating, I placed it all in the smoker. Will let this sit for about 3 or so hours and then off to the dehydrator they will go. Sunday will be very tasty.
We are so excited to welcome Lysa Cherrier to the team!!!
I’m thrilled to join Barricade Cyber Solutions as the Director of Incident Response Partnerships. Looking forward to meeting new people and building strong relationships. ???? #CyberSecurity #IncidentResponse #NewBeginnings
此处无法显示此内容
在领英 APP 中访问此内容等
The SuperBlack ransomware campaign, active since late January 2025, presents a serious threat to organizations utilizing Fortinet firewall appliances. Learn more in the SPOTREP: SuperBlack Ransomware Campaign on Barricade Cyber’s website. ?? #ransomware #Fortinet #threatactor
?? Review the SPOTREP below on the #TrumpCoin scam using ConnectWise (SreenConnect) RAT. ?? A SPOTREP, spot report, is a concise narrative report of essential information that covers events or conditions that may have an immediate and significant effect on current planning and operations. Binance #scam #crypto
SPOTREP: TrumpCoin Scam Using Connectwise RAT Size: Unknown number of targets; likely large-scale email campaign. Activity: Scammers spoofing Binance emails offering free TrumpCoin to trick users into downloading Connectwise RAT (ScreenConnect), enabling remote control and password theft. Location: Fake website hosted at binance-web3.com.ru (Russian domain); attacker location unknown. Unit/Uniform: Scammers posing as Binance, targeting MAGA supporters and crypto enthusiasts. Time: Campaign reported March 10, 2025; ongoing as of March 11, 2025. Equipment: Emails with Binance branding, fake website, Connectwise RAT installer, C2 server. Summary Scammers are sending emails impersonating Binance, offering up to 2000 free TrumpCoins for "special trading tasks." These emails link to a fake site (binance-web3.com.ru) that downloads Connectwise RAT, a remote access tool, disguised as a Binance Windows client. Within 2 minutes of installation, attackers gain control of victims’ systems, targeting passwords in apps like Microsoft Edge. Launched amid TrumpCoin’s debut on January 17, 2025, on Solana, the scam exploits MAGA supporters and crypto fans. The Russian-hosted domain suggests possible use of foreign infrastructure, though attribution is unclear. Conclusion The TrumpCoin scam using Connectwise RAT represents a sophisticated phishing campaign exploiting the hype around Trump-related cryptocurrencies. Its rapid deployment and targeting of specific demographics underscore the evolving nature of cyber threats. By following the recommended mitigation strategies, individuals can significantly reduce their risk of falling victim to such scams, contributing to a safer digital environment.
At Barricade Cyber Solutions, we pride ourselves on providing accurate #cybersecurity risk assessments for your organization, best-in-industry intelligence, and proven results for our clients, time and time again. Let's connect at recoverfromransomware.com. #cyberattack #ransomware
#LegoUpdate We are sorting out all the the LEGO Group items for the MUSC donation. Right now, THANKS TO YOU, we have over 200 kits ready for donation. Final number to come in the days to come.
?? Update on Fake BianLian Ransom Note Campaign - see post from our CEO below:
SPOTREP: Fake BianLian Ransom Note Campaign Activity: Scammers are impersonating the BianLian ransomware gang by mailing fake ransom notes to US companies. These notes falsely claim that the company’s IT network has been breached and sensitive data stolen, demanding Bitcoin ransom payments to prevent data leaks. Location: Letters originate from a Boston, MA office building (return address: BIANLIAN GROUP, 24 FEDERAL ST, SUITE 100, BOSTON, MA 02110) and are sent to CEOs at corporate mailing addresses. Unit: The fraudulent entity identifies itself as the "BIANLIAN Group." Time: Letters were mailed around February 25, 2025, with the scam reported by Guide Point Security and Arctic Wolf on March 4, 2025. Equipment: The scam utilizes snail mail, with envelopes labeled "Time Sensitive Read Immediately" and containing a Bitcoin wallet QR code for payment. Executive Summary: Reports from Guide Point Security and Arctic Wolf indicate that scammers are sending fake ransom notes via the United States Postal Service, posing as the BianLian ransomware gang. These letters, marked "Time Sensitive Read Immediately," target CEOs and claim a network breach with stolen data, demanding ransoms between $150,000 and $500,000 USD in Bitcoin. The return address points to an office building in Boston, MA. Security experts confirm with high confidence that these claims are fraudulent, designed to scare executives into paying without evidence of an actual compromise. Recommendation Barricade Cyber Solutions urges IT and security teams to immediately notify executives about this scam to avoid panic and wasted resources. For assistance or to report suspicious activity, contact Barricade Cyber Solutions at [email protected] (mailto:[email protected]) or visit barricadecyber.com. We also recommend reporting incidents to the FBI’s Internet Crime Complaint Center (IC3) at www.ic3.gov to aid in tracking and combating this fraud.