Security Company Founder Charged with Hacking Georgia Hospital An indictment unsealed this week in a Northern District of Georgia court accuses Vikas Singla, 45, with 18 separate counts of aiding and abetting a 2018 cyber attack against the Gwinnett Medical Center in Georgia. According to his LinkedIn profile, he is (or maybe now was) the COO of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I am sure that most of you reading this have not been on a conference call or video call in the last year, so this advice is not relevant to you, but for the rest of us, the NSA has a few tips on how to better protect yourself when you are collaborating online. The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A recent survey shows one downside of the remote work uptick. Most organizations are having a hard time controlling cloud computing costs! Fewer than 20% of survey respondents stated that they were able to immediately detect spikes in cloud costs Greater than 25% stated that it can take months or weeks or several days to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Google is facing a class action lawsuit for, the plaintiffs say, selling your data. The law firm that filed the case knows a bit about these kind of lawsuits. The firm, Bleichmar Fonti & Auld LLP has previously won settlements in the tens and hundreds of millions of dollars. The were part of the team […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Feds Recover Some of the Colonial Pipeline Ransom The feds say that they recovered most of the Bitcoin paid as ransom, but because the price of Bitcoin is in a slump, it is only worth about $2 million. The feds say that they acquired the private key to the Bitcoin wallet and transferred 63 Bitcoin […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Today we are going to talk about a novel part of the executive order – the Cyber Safety Review Board. It turns out that the act that created the Department of Homeland Security allows DHS to create advisory boards. The EO tells DHS to create an advisory board to review major cybersecurity events. Examples might […]
Continue reading →
[DISPLAY_ACURAX_ICONS]