720-891-1663

What if Ransomware is Just a Cover for Theft of Intellectual Property?

A China based Advanced persistent threat actor (APT) who has been active since last year seems to be using ransomware as a smokescreen for state sponsored espionage. The group has been using just one malware loader called the HUI loader, which seems to only be used by Chinese hackers. They use that to load Cobalt […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Board Members & C-Suite Need Secure Communication Tools

Board members and other executives are the key target of hackers. There is even a term for it – whaling. This has nothing to do with anyone’s personal dimensions, but rather that they are the big fish in the pond and have the most access to data. Many times, executives and board members are also […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security Vendors Say Azure Takes Months to Fix Bugs

The cloud is not magic. Nor does it fix all vulnerabilities. Cases in point. Two security vendors are accusing Microsoft of unnecessarily putting customers’ data at risk. The vendors, Orca Security and Tenable, are not bit players with a grudge, so you have to, at least, listen to them. According to the source: In a […]

Continue reading → [DISPLAY_ACURAX_ICONS]

HHS Says Preview of HIPAA Changes This Summer

I guess HHS wants to be cool, so rather than having a press conference where people can ask embarrassing questions, they are going to release the proposed changes via a prerecorded video – sometime this summer. These new rules will apply to covered entities (like doctors) and business associates (like IT providers). Part of what […]

Continue reading → [DISPLAY_ACURAX_ICONS]