The world’s most advance industrial malware – malware that is designed to go after industrial control systems in places like power plants – called PIPEDREAM, may already have infiltrated some critical infrastructure control systems, waiting to unleash who knows what. Global business advisory firm Ankura said that they are concerned that PIPEDREAM cannot be stopped […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
FDA Will No Longer Approve Digital Medical Devices That Are Vulnerable Starting last month, the FDA will REJECT all new applications for any cyber medical device that does not include a cyberattack protection plan. Of course this won’t be perfect, but at least manufacturers will have to make an effort at it. Given that the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This is a secondary problem of vendor cyber risk. The first problem is that you are dependent on a lot of vendors. You have to depend on those vendors. If they screw up, you get sued. And you lose customers. To make matters worse, when one of your vendors gets breached, you are only one […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The stakes in getting breached are definitely increasing. Historically, victims of a breach have sued the breached company claiming some potential future, but vague, damages. Often the suits get thrown out saying that these potential future damages are not sufficiently real. Independent Living Systems is a VENDOR to healthcare providers in Florida. They were breached […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Even the DoJ Thinks John Deere Should Let Farmers Fix Their Tractors The “right to repair” movement has been growing for the last decade. John Deere has been leading the “its not safe for you to fix your own tractor” movement for years, saying they have made tractors too complicated for owners to fix. The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hackers Claim They Breached T-Mobile More Than 100 Times in 2022 Three different cybercriminal groups claimed access to internal networks at communications giantĀ T-MobileĀ in more than 100 separate incidents throughout 2022, new data suggests. In each case, the goal of the attackers was the same: Phish T-Mobile employees for access to internal company tools, and then […]
Continue reading →
[DISPLAY_ACURAX_ICONS]