720-891-1663

What if Ransomware is Just a Cover for Theft of Intellectual Property?

A China based Advanced persistent threat actor (APT) who has been active since last year seems to be using ransomware as a smokescreen for state sponsored espionage. The group has been using just one malware loader called the HUI loader, which seems to only be used by Chinese hackers. They use that to load Cobalt […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Board Members & C-Suite Need Secure Communication Tools

Board members and other executives are the key target of hackers. There is even a term for it – whaling. This has nothing to do with anyone’s personal dimensions, but rather that they are the big fish in the pond and have the most access to data. Many times, executives and board members are also […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending June 17, 2022

Ransomware Morphs Again We know that ransomware has gone through a lot of iterations over the last couple of years as hackers try to maximize their revenue. The BlackCat group is now creating public websites for each victim company and has indexed the data to make it easy to search. I guess this means that […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security Vendors Say Azure Takes Months to Fix Bugs

The cloud is not magic. Nor does it fix all vulnerabilities. Cases in point. Two security vendors are accusing Microsoft of unnecessarily putting customers’ data at risk. The vendors, Orca Security and Tenable, are not bit players with a grudge, so you have to, at least, listen to them. According to the source: In a […]

Continue reading → [DISPLAY_ACURAX_ICONS]