720-891-1663

08.01.25 Security News Bites

Drug Cartels Use IT to Kill FBI Informants According to a newly published report, a Sinaloa cartel/El Chapo insider contacted the FBI in 2018 and told it of all the ways in which the cybercrook hired by the cartel helped it track down those who could give up key details about its operation and eliminate […]

Continue reading → [DISPLAY_ACURAX_ICONS]

It is the Supply Chain That is Being Attacked

I can’t say this enough. Supply chains are the weak spot and hackers know it and abuse it. Scattered Spider, the group responsible for attacks on US insurance firms Aflac, Philadelphia and Erie and British retailers like Marks & Spencer and others, uses supply chain attacks as their favorite method. After they use social engineering […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Why Storing Government IDs by Websites is a Problem

The Tea app, apparently, is a women-only dating safety app where members can share reviews about men, with access to the platform requiring a selfie and a government ID. The app, apparently, had a security problem. On Friday a user posted that there was an unsecured Firebase storage bucket with driver’s licenses, selfies and photos […]

Continue reading → [DISPLAY_ACURAX_ICONS]

07.25.25 Security News Bites

AI is Great – But Is It Secure? MCP (Model Context Protocol) servers are the backbone of agentic AI. But researchers say that authentication is optional and nearly all of the nearly 2,000 MCP servers exposed to the Internet today do not require authentication or have access controls. What could possibly go wrong? To test […]

Continue reading → [DISPLAY_ACURAX_ICONS]

FBI Says Thousands Involved in Ransomware, Swatting

The FBI released a warning yesterday about a loosely-organized cybercriminal organization called The Com. The Com launches cyberattacks to steal money and information. The FBI released 3 security bulletins about The Com, a group made up of English-speaking minors, but which has expanded to include THOUSANDS of people who commit a variety of crimes. The crimes include ransomware, […]

Continue reading → [DISPLAY_ACURAX_ICONS]