If that headline doesn’t keep you up at night, I don’t know what will. The Government Accountability Office (GAO) says they have have found inefficiencies in CISA’s information sharing practices, in particular with critical infrastructure stakeholders. They also say that CISA is understaffed for handling OT incidents. Just to make sure everyone is on the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hacking and Stealing Your Car From the Outside Through Your Headlight Apparently this is real. Crooks can pop off the headlight trim on some cars and get access to the cables to your “smart” headlights. From there they have access to the data bus called the CAN bus and from there they can unlock and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Houser LLP law firm specializes in taking care of high-profile financial institutions. Last May they were hacked. Ten months later they are finally notifying those high profile customers. They eventually were forced to disclose the breach to the Maine AG (among others). They said files were encrypted (AKA ransomware) and data was stolen. Data […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A large and revealing leak from China was released earlier this month. It shows how much the hacking world in China has turned into a business. The company, i-SOON, was the victim of a leak. So sad! Not! The hacker posted a collection of 500 internal documents to GitHub. The documents reveal details of China’s […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The FBI touted just last week that they had taken down LockBit and replaced the servers with ones that offered free decryption keys and sunshine for all. It didn’t last long. The Russia-based hackers have reconstituted themselves and have new servers. It is true that the FBI and Europol and others did take down their […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
U.S. Intelligence agencies say that China is shifting tactics. Or, maybe just adding new ones. The NSA, CISA and FBI said, in a joint advisory, that China-backed hackers have maintained access inside U.S. critical infrastructure such as aviation, rail, mass transit, highway, maritime, pipeline, water and sewage to prepare to launch a catastrophic attack at […]
Continue reading →
[DISPLAY_ACURAX_ICONS]