China has long ranked at or near the top of U.S. national security officials’ list of cyber adversaries. On Wednesday, spy agency leaders warned that China is getting even bolder and better in cyberspace. The spies say that if China believed that it was on the verge of a major conflict with us, they might launch […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Given the risk of cyberattacks on critical infrastructure, the government is responding. After the Colonial Pipeline attack, the TSA (yes, they are responsible for pipeline security-don’t ask) issued a somewhat misguided set of rules to pipeline owners. Those rules were updated a couple of months later, but at least there is some activity. Actually quite […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As most of you probably know, TikTok is in the fight of its life. While, if Americans stop using it, that only represents a hundred million users, they are relatively speaking very wealthy and the data they represent is very useful. While TikTok says it is not sharing your data with the Chinese government, China, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hackers Claim They Breached T-Mobile More Than 100 Times in 2022 Three different cybercriminal groups claimed access to internal networks at communications giant T-Mobile in more than 100 separate incidents throughout 2022, new data suggests. In each case, the goal of the attackers was the same: Phish T-Mobile employees for access to internal company tools, and then […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The U.S. government released its widely anticipated National Cybersecurity Strategy on Tuesday, pushing mandatory regulation on critical infrastructure vendors and green-lighting a more aggressive ‘hack-back’ approach to dealing with foreign adversaries and ransomware actors. The strategy is just that, a roadmap. While parts of it can be done without Congress’ approval, lots of it require additional authority. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Mergers and acquisitions are a time to tread carefully. While all M&A teams review financials, sales projections, key personnel, etc., it is much less likely that the review includes examining the code base being acquired for vulnerabilities. That is probably not a good decision. Synopsys sells a service to review software during mergers and acquisitions […]
Continue reading →
[DISPLAY_ACURAX_ICONS]