The FBI, NSA, CISA, Australia, Canada, New Zealand and the UK (AKA the US and the Five-Eyes Countries) issued a joint advisory on Chinese cyber tactics in light of the Guam critical infrastructure attack. Living off the Land means an attack that uses existing, already installed, vendor signed software to launch an attack and maintain […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Sometimes a Patch Goes Sideways HP is working to figure out how to deal with a firmware update to a number of Office Jet printers that “bricked” the printers, meaning that these printers are only useful as a brick or paperweight. The will not boot and all the user gets is a blue screen with […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The feds have upped the game and are going after companies that get breached that do not have effective cybersecurity programs. In this case, practice management software vendor Professional Business Systems, Inc. The company, who does business under the name Practicefirst Medical Management Solutions failed to install a firewall patch in January 2019. That failure […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
RICO is a dragnet law which can subject people and companies to very serious penalties and jail time. This is an extension of the negligence class-actions that use the principles of the Caremark Standard to go after companies with inadequate cybersecurity programs. This is a shift away from the lawsuits the claim that “my social […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Privacy litigation is a new way for attorneys to make money. Based on the number and types of cases, they think they can make a lot of it. Some examples: Clearly lawyers are checking out the landscape here. Some types of claims will just go away if no one wins the cases. Others may be […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Google Adds Dark Web Monitoring to GMail Users A feature that used to be available to paid Google One subscribers will soon be available to all GMail users. Dark web monitoring tells you if your GMail email address is found on the dark web (hint: almost all of them are due to thousands of data […]
Continue reading →
[DISPLAY_ACURAX_ICONS]