720-891-1663

Security News Update for the Week Ending March 3, 2023

Hackers Claim They Breached T-Mobile More Than 100 Times in 2022 Three different cybercriminal groups claimed access to internal networks at communications giant T-Mobile in more than 100 separate incidents throughout 2022, new data suggests. In each case, the goal of the attackers was the same: Phish T-Mobile employees for access to internal company tools, and then […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Feds Release National Cybersecurity Roadmap

The U.S. government released its widely anticipated National Cybersecurity Strategy on Tuesday, pushing mandatory regulation on critical infrastructure vendors and green-lighting a more aggressive ‘hack-back’ approach to dealing with foreign adversaries and ransomware actors. The strategy is just that, a roadmap. While parts of it can be done without Congress’ approval, lots of it require additional authority. […]

Continue reading → [DISPLAY_ACURAX_ICONS]

48% of Code Bases Examined Contained High-Risk Vulnerabilities

Mergers and acquisitions are a time to tread carefully. While all M&A teams review financials, sales projections, key personnel, etc., it is much less likely that the review includes examining the code base being acquired for vulnerabilities. That is probably not a good decision. Synopsys sells a service to review software during mergers and acquisitions […]

Continue reading → [DISPLAY_ACURAX_ICONS]

So You Think You Are Saving Money by Letting People Use Personally Owned Computers

Many companies allow employees to use their own personal computers for work. They do this for employee convenience and an apparent cost savings. After all, if we don’t have to buy employees their own laptop, certainly we will save money. At least it seems like that is true. In a perfect world, with no hackers, […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Google Working to Improve Android Hardware Security

As operating system vendors (Apple and Google) improve their security and make hacking their products more difficult, hackers are looking elsewhere for “ways in”. While users consider their phones a single computer, the reality is that there are whole bunch of computers under the hood. Processors for each radio in the phone such as the […]

Continue reading → [DISPLAY_ACURAX_ICONS]

GoDaddy Admits Hackers Roamed Their Network for THREE YEARS!

I’ve never been a fan of GoDaddy for a variety of reasons, but now I have a major reason not to like them. In 2020 GoDaddy alerted 28,000 customers that an attacker used their credentials in 2019 to abuse their hosting accounts. That is over 3 years ago and that was the start of a […]

Continue reading → [DISPLAY_ACURAX_ICONS]