Board members and other executives are the key target of hackers. There is even a term for it – whaling. This has nothing to do with anyone’s personal dimensions, but rather that they are the big fish in the pond and have the most access to data. Many times, executives and board members are also […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Ransomware Morphs Again We know that ransomware has gone through a lot of iterations over the last couple of years as hackers try to maximize their revenue. The BlackCat group is now creating public websites for each victim company and has indexed the data to make it easy to search. I guess this means that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This is an interesting story of how law enforcement, completely legally, can obtain data that you thought you deleted. Well, you did delete it, but deleted does not really mean deleted. Earlier this year the FBI was trying to solve a string of seven bank robberies in five states. One of the tools that they […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The cloud is not magic. Nor does it fix all vulnerabilities. Cases in point. Two security vendors are accusing Microsoft of unnecessarily putting customers’ data at risk. The vendors, Orca Security and Tenable, are not bit players with a grudge, so you have to, at least, listen to them. According to the source: In a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I guess HHS wants to be cool, so rather than having a press conference where people can ask embarrassing questions, they are going to release the proposed changes via a prerecorded video – sometime this summer. These new rules will apply to covered entities (like doctors) and business associates (like IT providers). Part of what […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Ransomware hackers are like the smash and grab style of burglar. They don’t care who knows that they are here or what they are doing. Their techniques become quickly known and have to continuously evolve. They sometimes make a quick payday. Option two is a stealthy hacker who attempts to sneak in undetected, remain inside […]
Continue reading →
[DISPLAY_ACURAX_ICONS]