On Friday Title industry software and consulting provider was hit by a ransomware attack. Cloudstar operates 6 data centers and supports over 40,000 customer users. Now those customers are wondering what are they going to do. Cloudstar users who close real estate sales are dependent on Cloudstar’s systems being up. Cloudstar has been down since […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
First it was California (version 1 and version 2); then it was Virginia. Now it is Colorado. IT IS NOT GOING TO STOP THERE. California’s CCPA covered human resources data somewhat. CPRA covers it completely and will require HR departments to create programs to protect HR data. This includes notices at the time data is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The last presidential administration went hard after China – applying sanction after sanction, but with minimal success. They also seemed to give Russia a free pass. Many of the very public recent hacks are being attributed to Russia, including SolarWinds and Kaseya. When Biden met with Putin in Helsinki last month, the two agreed to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In light of the recent series of supply chain attacks (actually going back to 2011 at least), speed is crucial. SolarWinds, Microsoft Exchange, Kayesa and others. This weekend’s attack against MSP software provider Kaysera is a perfect example of why speed is so important. Many small and medium sized companies are dependent on managed service […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
WD NAS Devices Are Being Wiped Worldwide The downside of using computers beyond their end of support is that you can get hacked and all of your data can get wiped. This is what has happened to many WD My Book owners. Western Digital stopped patching them in 2015 and hackers have figured out how […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Okay, you are probably tired of hearing me rant about software supply chain but it is a huge source of hacks. Big hacks like SolarWinds and Microsoft Exchange, but mostly small hacks that we never figure out what the source is. Reseachers looked at what developers actually do. The analyzed 13 million scans of 86,000 […]
Continue reading →
[DISPLAY_ACURAX_ICONS]