720-891-1663

17 Hours: Time Between Hacked and Extorted

That is a scary statistic. It used to be that hackers lurked inside your systems for days, weeks and even months conducting surveillance. This increased the chance of detecting them before they did damage. Damage like we are seeing with newspaper conglomerate Lee Enterprises, publisher of 72 newspapers and 350 specialty publications. Lee has been […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News Bites for February 14, 2025

Anyone Can Push Updates to the DOGE.Gov Website The web site pulls from a database that anyone can edit. The ultimate definition of full transparency, I guess. It is also not hosted on a government server. Credit: 404 Media VP Calls for Less AI Regulation at Summit The Veep spoke at the Paris AI Action […]

Continue reading → [DISPLAY_ACURAX_ICONS]

China, Russia Continue Cyberattacks Unabated; Unclear What US Intends to do

Multiple Chinese hacking groups continue to go after US and other companies and agencies with, apparently, no consequences. China’s Salt Typhoon, who hacked a dozen or more major US telecom and Internet providers including Verizon and AT&T, is now using vulnerabilities in Cisco firewalls worldwide. In December and January the Chinese government hackers successfully broke […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Coast Guard Not Ready to Protect Maritime Cybersecurity

Yet another challenge for the new administration. In the face of escalating cyber threats against the US maritime transportation system, the Coast Guard, which is responsible for maritime cybersecurity, doesn’t have a plan. The GAO released a report on a year long study that says, basically, not ready for prime time. The Russians, Chinese and […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Apple Warns of “Extremely Sophisticated Attack”

Since Apple is usually very mild in its reports, to call this an extremely sophisticated attack that may be targeting iThings is pretty unusual. The bug is in something called USB restricted mode which disables the USB port on phones and tablets after they have been locked for an hour. The idea is to stop […]

Continue reading → [DISPLAY_ACURAX_ICONS]