Come tomorrow and Monday, there are changes in store for publicly traded companies when it comes to cybersecurity. This will help everyone else since virtually all companies have publicly traded companies who are vendors or business partners and this extra information will help you understand your partners’ cybersecurity efforts. Industry groups and Republicans aren’t excited […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Thru October, depository institutions (mainly banks) filed 440,000 suspicious activity reports (SARs) related to check fraud according to the Financial Crimes Enforcement Network or FINCEN. Last year, for the same period, that number was 420,000. This puts us on track for 500,000 reports for the year, which is double the number from 2021. To help […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
US Warns That Iran Terrorists Broke into Multiple US Water Facilities Last week I reported that the Aliquippa, Pennsylvania Water Authority fessed up to the fact that hackers successfully broke into their network, compromising a pump station, using a vulnerability in an Israeli OT network system that is repackaged by multiple vendors. Now the FBI, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Health and Human Services (HHS) says it is planning to take a range of actions to reduce cyberattacks on hospitals which have gone a bit crazy in the last few years. They released the proposal yesterday. The plan is to tie the new cybersecurity requirements through the Medicare and Medicaid programs, tying payments to baseline […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Real ID, a misguided effort by the feds to make everyone have a less easily fakeable driver’s license (notice I did not say a secure driver’s license) came out of the 9-11 attacks. For the last 20 years the feds have been trying to get the states to implement the law, with many states resisting […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
No big surprise here. Researchers have gotten full read and write access to Meta’s Bloom, Meta-Llama and Pythia large language models in a typical example of supply chain risk. If they had been hackers or a non-friendly nation, they could have poisoned the training data, stolen the models and datasets and other unfriendly things. AI […]
Continue reading →
[DISPLAY_ACURAX_ICONS]