Articles - Managed IT & Cybersecurity for Small Businesses - Simplified Solutions

Articles

Search returned 12 total results.

Ben Loveless Oct 28, 2025
Shadow AI Threats Are Increasing in Business Attacks

Cybercriminals are beginning to use artificial intelligence in unexpected ways, giving rise to what experts call "shadow AI." These tools can automate attacks, mimic real employees, and generate convincing phishing attempts. This article explains what shadow AI is, why it matters for small businesses, and what steps organizations can take to reduce risk.

When a Browser Alert Isn’t What It Seems: How Push Notifications Are Being Abused for Attacks

Cybercriminals are leveraging browser push notifications in sneaky new ways, using a toolkit called Matrix Push C2 to send fake alerts, phishing links, and malware redirects. This article explains how these attacks work, why individual vigilance matters, and what steps you can take to spot and block suspicious notifications before they lead to compromise.

Ben Loveless Dec 11, 2025
Ben Loveless Nov 8, 2025
New Microsoft Teams Trick: How Matanbuchus Is Being Delivered and What to Do If You’re Affected

Attackers are abusing collaboration tools like Microsoft Teams to trick users into running scripts that deploy the Matanbuchus loader, which gives criminals a quiet foothold on Windows systems. This article explains what Matanbuchus does, why Teams and Quick Assist are effective vectors, and how to discover and remove the loader if you find it on your devices.

How to Determine the Distribution Type and Architecture of Your Computer

Before generating your installer, it helps to know your computer's operating system, distribution type, and architecture. This quick guide walks you through how to find that information on Windows, macOS, and Linux, so you can select the correct options on the installer page.

Ben Loveless Oct 29, 2025