720-891-1663

Security News for the Week Ending March 8, 2024

Hacking and Stealing Your Car From the Outside Through Your Headlight Apparently this is real. Crooks can pop off the headlight trim on some cars and get access to the cables to your “smart” headlights. From there they have access to the data bus called the CAN bus and from there they can unlock and […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Justice Department Going After Cybersecurity Fraud

The False Claims Act (FCA) is a Civil War era law that both penalizes companies for lying about their cybersecurity protections and rewarding whistleblowers for turning in fraudsters. In 2021 the Justice Department created a new initiative to stem civil-cyber fraud. One of the beneficiaries of that is the Defense Department which has been plagued […]

Continue reading → [DISPLAY_ACURAX_ICONS]

The Impact of Supply Chain Cyberattacks

I talk all the time about third-party or supply chain breaches and there is serious impact to them. Here is one example going on now. Change Health is a healthcare payment facilitator among other services. They are used by doctors, pharmacies and hospitals to get paid. Change is owned by Optum Health which, in turn, […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Another Law Firm Gets Security Religion – AFTER Hackers Stole 325,000 Customer’s Data

The Houser LLP law firm specializes in taking care of high-profile financial institutions. Last May they were hacked. Ten months later they are finally notifying those high profile customers. They eventually were forced to disclose the breach to the Maine AG (among others). They said files were encrypted (AKA ransomware) and data was stolen. Data […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending March 1, 2024

Five Eyes Agencies: SolarWinds Hackers Adopting New Tactics As businesses move to the cloud, hackers are adopting new techniques since Software as a Service providers are much better at patching than most companies are. Instead, the Russian hackers are stealing authentication tokens and using them to get access to the cloud, including creating new accounts […]

Continue reading → [DISPLAY_ACURAX_ICONS]