720-891-1663

3rd Party? 4th Party? 5th Party Breach – Oh My!

Just a few years ago all we worried about was hackers breaking into our servers in the computer room in the office. We expanded that footprint to include servers located in a data center space that we rented (also called a colo). Those were still servers that we owned. And patched – hopefully. Then we […]

Continue reading → [DISPLAY_ACURAX_ICONS]

After FTX Collapses, Feds Go After Binance

Sam Bankman-Fried demonstrated what happens when you combine unfathomable amounts of money and no regulation. It isn’t pretty. Binance moves $12 billion a day and has no physical office. What could possibly go wrong? Since the SEC was asleep at the wheel when FTX collapsed, leaving a lot of customers high and dry – since […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News Bites for the Week Ending June 2, 2023

Dutch Data Protection Authorities Looking Into Alleged Tesla Data Breach Germany’s Handelsblatt reported on Thursday that Tesla (TSLA.O) had allegedly failed to adequately protect data belonging to customers, employees and business partners, citing 100 gigabytes of confidential data leaked by a whistleblower. The Dutch DPA is looking into the situation. Among the data is Elon’s Social plus […]

Continue reading → [DISPLAY_ACURAX_ICONS]

FTC Helps App Developers Understand Data Sharing

When I say “help”, I mean that only in the kindest of terms, such as placing the company under a 20 year monitoring program, among other assistance. In this case, a company called Easy Healthcare has a free ovulation tracking app. As most of you well know, if it is free, you are the product. […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Cybersecurity Advisory – China Using “Living off the Land” Attacks to Avoid Detection

The FBI, NSA, CISA, Australia, Canada, New Zealand and the UK (AKA the US and the Five-Eyes Countries) issued a joint advisory on Chinese cyber tactics in light of the Guam critical infrastructure attack. Living off the Land means an attack that uses existing, already installed, vendor signed software to launch an attack and maintain […]

Continue reading → [DISPLAY_ACURAX_ICONS]