We have heard from two big name firms who succumbed to the recent Petya/NotPetya ransomware attack and they provide interesting insights into dealing with the attack. First a quick background. A week ago the world was coming to grips with a new ransomware attack. Initially called Petya because it looked like a strain of the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
One of the things that we see from time to time is SSL/TLS certificates issued by less than reputable – or simply don’t care – certificate authorities for domains that the certificate requester does not own. The Internet Engineering Task Force, the body that oversees the technical operation of the Internet, has released a new […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
You may recall that a hacking group called the Dark Overlord hacked into Larson Studios, a third party provider to Netflix and other studios. They stole the unreleased copies of the whole season of Orange as well as about 36 other series and movies. Now we are beginning to hear the back story and it […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I have been standing on my IoT soapbox for a while, saying that IoT is dangerous and people don’t know it. As a result, people aren’t doing anything about it. Well, today I received a dose of reality. We recently completed a vulnerability scan for a client of ours and one of the findings was […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
When was the last time you patched your Internet router? Probably never. That is what the CIA is counting on. As well as foreign governments and just plain hackers. But when it comes to the CIA, they are probably not interested in you. That may not be the case when it comes to the other […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In what has to be one of the largest disclosures of personal data ever, it appears that a Republican National Committee vendor exposed their collection of data on 198 million U.S. voters in the cloud for anyone to trip over. Unlike other cases where hackers broke in or used zero day exploits to compromise systems, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]