720-891-1663

Google Working to Improve Android Hardware Security

As operating system vendors (Apple and Google) improve their security and make hacking their products more difficult, hackers are looking elsewhere for “ways in”. While users consider their phones a single computer, the reality is that there are whole bunch of computers under the hood. Processors for each radio in the phone such as the […]

Continue reading → [DISPLAY_ACURAX_ICONS]

GoDaddy Admits Hackers Roamed Their Network for THREE YEARS!

I’ve never been a fan of GoDaddy for a variety of reasons, but now I have a major reason not to like them. In 2020 GoDaddy alerted 28,000 customers that an attacker used their credentials in 2019 to abuse their hosting accounts. That is over 3 years ago and that was the start of a […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Almost 80% Fear Software Stack Breach

That is a big number and even if it is off by say 25% or 30%, that is still huge. Cisco Systems surveyed over a thousand organizations across Australia, India, Japan, Germany, the UK and US. All companies had revenues in excess of $500 million, so you can’t say these are small shops without a […]

Continue reading → [DISPLAY_ACURAX_ICONS]

State-Sponsored Hackers Changing Tactics to Put Companies at Risk

State-sponsored threat groups increasingly use ransomware-like attacks as cover to hide more insidious activities. Russian advanced persistent threat (APT) group Sandworm used ransomware programs to destroy data multiple times over the past six months while North Korea’s Lazarus group used infrastructure previously associated with a ransomware group for intelligence gathering campaigns. Chinese state sponsored hackers […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Hacker Uses Verified Microsoft Account to Compromise Users

Microsoft has a badge, sort of like Twitter and just like Twitter, apparently these badges can be hacked. Security firm Proofpoint first discovered the attack involving three rogue apps which were impersonating single signon and online meeting apps. If the user installs these rogue apps, they ask for permissions to their Microsoft 365 account, which […]

Continue reading → [DISPLAY_ACURAX_ICONS]

TSA Tells Airlines to Secure No-Fly-List

The TSA has issued a security directive to all US Airports and airlines telling them to tighten up their cybersecurity procedures. This after a Swiss researcher discovered an unprotected copy of the no-fly-list and other sensitive documents belonging to United Airlines feeder carrier CommuteAir. The researcher also said that he probably could have cancelled or […]

Continue reading → [DISPLAY_ACURAX_ICONS]