720-891-1663

Security News Update for the Week Ending May 3, 2024

Cyberattack Ramifications: Chain Closes ALL STORES to Contain Attack Canadian pharmacy chain London Drugs has closed all stores to contain a cyberattack. While many stores stop accepting online orders or credit cards after a cyberattack, it is very rare to see a company stop doing business until further notice. However, they have not notified authorities […]

Continue reading → [DISPLAY_ACURAX_ICONS]

US Says Russia Exploiting Weak Security at Water, Wastewater Plants

Shoddy security practices. Short of cash. Lack of personnel to deal with threats. Outdated equipment connected to the Internet. Weak passwords. CISA and the FBI say these are just some of the issues that critical infrastructure operators are facing. Anti U.S. (pro-Russian) hackers are intensifying attacks on critical infrastructure such as water, wastewater, dams, energy […]

Continue reading → [DISPLAY_ACURAX_ICONS]

You Can’t Trust Cyber Crooks – DUH!

It was always difficult to separate fact from fiction when it came to breach information. Too many players had their own agendas to know what was real. Now there is another player in the room and it is FEAR, UNCERTAINTY AND DOUBT. Over the past four months alone, the press, social media accounts, and some […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Cloud Vendors Say “Know Your Customer” Rule is “Hard”

A Presidential Executive Order (EO) is making its way though the approval process which, if approved, would require cloud vendors like Google and Amazon to identify who is buying server time from them. This is very similar to what banks and other financial institutions have been doing for decades. But Google’s and Amazon’s trade group […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News Update for the Week Ending April 26, 2024

HHS Beefs up Privacy Protection for Reproductive Healthcare Info In a final rule released this week, doctors, clinics and other providers are prohibited from disclosing protected health information related to lawful reproductive healthcare. The rule is designed to protect women who cross state lines seeking an abortion and their providers. The 291 page regulation will […]

Continue reading → [DISPLAY_ACURAX_ICONS]

SURPRISE: GPT-4 Can Exploit Unpatched Vulnerabilities

Who would have guessed? Researchers at the University of Illinois Urbana-Champaign (UIUC) fed AI agents vague descriptions of more than a dozen unpatched vulnerabilities. The agent they created with GPT-4 exploited 87 percent of those vulnerabilities. Fourteen other agents made with lesser tools like GPT 3.5 and Metasploit failed. The researchers said that GPT-4 was […]

Continue reading → [DISPLAY_ACURAX_ICONS]