As the Maze ransomware group continues to hit new targets like banks and defense contractors, among many others, those companies, in many cases, decide to restore their systems from backups and not pay the ransom. So Maze decided to nuance their crime and steal (or exfiltrate) the data before encrypting it. That way, if the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Five years after the Pentagon demanded that every weapon system include the requirement that it be able to function in the face of Russian and Chinese cyber attacks, many major weapons systems don’t even include cybersecurity as a key performance parameter, never mind actually working under those conditions. This means that all our adversaries need […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Minneapolis City Web Sites Hit by Denial of Service Attacks Last Thursday, early in the morning, a number of City of Minneapolis web sites were disabled by denial of service attacks. The attacks are short lived and the city was able to restore most of the services within a few hours. It is certainly possible […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Given that over 40 million Americans filed for unemployment in the last two months, they are likely a fair number of resumes being emailed around. For those people who have been affected by the virus, many of them likely had to fill out medical leave forms. So how can a hacker take advantage of this […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I keep saying that ransomware is morphing; that the ransomware that we have known for the last many years is no more. It used to be that the hackers could get people to pay by encrypting their data, so people started doing better with backups. Not necessarily great, but better. So last year one hacker […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The day after Twitter fact checked two of Trump’s tweets regarding vote by mail as massively fraudulent, he issued an executive order to get even with them. What Trump would like to do is revoke Twitter and other social media sites’ protections provided by Section 230 of the Communications Decency Act, so that he and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]