Avatar photo

Carl Keyser

Inbound Marketing Manager
Integris

As Inbound Marketing Manager at Integris, Carl Keyser brings expertise in digital marketing and SEO to create insightful blog content that educates and informs readers about technology trends and best practices.

Wooden blocks spelling "SCAREWARE" placed on a background of scattered programming terms and codes.

What is a Scareware Attack?

Scareware is a form of malware which uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users into buying unwanted software. Scareware is part of a class of malicious software…

Read More
Person wearing a hoodie working on a computer with multiple screens displaying code. They are holding a credit card in one hand and typing with the other. Various items are on the desk.

2.5 Million Student Loan Holders Exposed by Breach…

2.5 Million Student Loan Holders were exposed in a recent data breach. Learn more here.

Read More
Abstract digital circuitry design against a deep blue background, with interconnected lines and points representing a technological network.

Cynet’s 2022 Survey of CISOs with Small Cyber Security Teams

Are small cybersecurity teams abandoning MSSPs? Are overlapping technologies really the industry’s #1 pain point? 200 CISOs seem to think so. Learn more.

Read More
A man wearing sunglasses and minimal clothing gestures with both hands pointing upwards against a blue background.

Jagshemash! Meet Borat, the newest RAT on the Block…

There’s a new RAT on the block and it’s named Borat! Lean more here!

Read More
Person in a hoodie with a darkened face sits in front of several computer screens displaying code and analytics data, in a dimly lit room with city lights in the background.

Dark Utilities: Off the shelf Command-And-Control Attacks…

Dark Utilities is offering Command and Control attacks for just over $10 a payload. Learn more about it here.

Read More
A raccoon peeks out from inside a metal trash can with the lid leaning against it, set against a plain white background.

Raccoon Stealer v2: What You Need to Know…

Keep the raccoons out of your trash cans AND your end-points. Learn what you need to know about the new MaaS Raccoon Stealer v2.

Read More
Three haloed figures with wings sit around a table in a traditional religious icon style, with a building and trees in the background.

H0lyGh0st Ransomware: North Korea’s New Weapon

North Korea’s H0lyGh0st gang is wreaking havoc with ransomware around the globe. Learn more about it here.

Read More
A key ring with four silver keys lying on a light-colored tabletop.

Are Passkeys the Future? Apple Seems to Think So…

Apple has announced its plan to abandon the password and adopt passkeys. What’s going on? Learn more here.

Read More
A person inserts a USB flash drive into a laptop on a dark table, with one hand on the keyboard and the other holding the flash drive.

What is a Baiting Attack?

What is baiting? It is one of the simplest social engineering techniques since all that it involves is an external storage device. An attacker will leave a malware-infected external storage…

Read More
Person wearing a gorilla costume sits on rocks by the water, using a laptop, with the sun setting in the background.

The Torrid Tale of a GUI Based Ransomware Builder

Chaos/Yashma is a new GUI based .NET ransomware builder. Learn more here.

Read More