720-891-1663

Security News for the Week Ending November 5, 2021

Trump is Fighting a Mastodon Donald Trump’s not-yet-launched social media site, Truth, is already fighting a potential lawsuit. Although Trump has not said so, tech folks who have seen the site say that it is based on the open source social media code base called Mastodon. The license that comes with Mastodon requires that users […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Have You Adjusted Your Penetration Testing Strategy for the Cloud?

Hackers are targeting the cloud. Why? To paraphrase Willie Sutton, because that is where the data is. Historically, penetration testers gain access to network devices through the “perimeter defense” and then they move around (the so-called east-west movement) trying to get access to data, wherever it lives inside the network perimeter. But in the cloud, […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending October 22, 2021

State Acknowledges Data Breach After 10 Months I guess better late than never. Finally, the State of Illinois is admitting to a data breach, sort of. Here is what they are now saying. Check the dates below. Notice who was among the last to know – the victims. Can the state be fined for breaking […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending October 15, 2021

Microsoft Investigating Multiple Windows 11 Issues While some of the issues are not fatal, others like a memory leak in File Manager that can only be recovered from by rebooting are more of a problem. I recommend waiting for a month or two in order for other users to detect more bugs. Credit: Bleeping Computer […]

Continue reading → [DISPLAY_ACURAX_ICONS]

What Happens When Hackers Steal ALL of the Code to your System

Just ask Twitch. The livestreaming service for video gamers, esports, music and other content fell to hackers. It was acquired by Amazon in 2014 for almost a billion dollars. Hackers broke in and stole 135 gigabytes of data. This includes all of the source code to the platform, transaction data, userids, passwords and other information. […]

Continue reading → [DISPLAY_ACURAX_ICONS]