720-891-1663

Security News Bites for June 13, 2025

TLS Certificate Lifetimes Will Officially Reduce to 47 Days If you are responsible for a website, this applies to you. TLS certificates, the tech behind making HTTPS:// work on your website, has been changing over the years. A website owner used to be able to buy a certificate and it would be valid for 10 years. But […]

Continue reading → [DISPLAY_ACURAX_ICONS]

First Major Studio Lawsuit Against AI

We knew this was just a matter of time. It will be interesting to see what the courts do with this. Disney and NBCUniversal filed a suit this week against Midjourney, an AI startup that allows its customers to create images, including copies of Disney and NBCUniversal characters. In the lawsuit, they claim that there […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Do You Think Your Drinking Water is Safe from Cyberattacks?

We have seen multiple attacks in the last few years on municipal water supplies. The good news is that none of them killed anyone. Mostly, that was just because we were lucky. A bug in a TLS certificate (used to implement HTTPS) allowed researchers to view the water system control panel in hundreds of public […]

Continue reading → [DISPLAY_ACURAX_ICONS]

New Cybersecurity Executive Order Released

The president issued an EO aimed at strengthening the United State’s cybersecurity. The White House memo talks about software development, BGP router protocol security, post-quantum cryptography, AI security, IoT security, encryption, sanctions policies and addressing the prevent the abuse of digital identities. But an EO only represents the president’s wishes so we will see whether […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News Bites for June 6, 2025

Fake Social Security Emails Trick Users into Installing Remote Access SW Cybersecurity experts have uncovered ongoing schemes where criminals are exploiting the US Social Security Administration (SSA) to trick people into installing a dangerous Remote Access Trojan (RAT). This program gives the attackers complete remote control, allowing them to steal personal information and install more […]

Continue reading → [DISPLAY_ACURAX_ICONS]