The Cyberspace Solarium Commission created a list six years ago of things the government should be doing with regard to cybersecurity policy. The commission made 82 recommendations and each year some of them have been enacted into law, usually as part of the national defense authorization act (NDAA), a must pass bill that funds the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Now North Korea Using Fake IT Workers to Extort Employers Scams evolve. Now that the scam concept is public, North Korea is pivoting. They are extorting the companies that hire these North Koreans as IT employees after the employees steal corporate secrets. Read the details here. SURPRISE! (Not) – OpenAI Confirms Attackers use ChatGPT to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
For those of in the cybersecurity industry this is not a big surprise. MxD is recognized as the National Center for Cybersecurity in Manufacturing by the Department of Defense and they conducted some interesting research. They conducted a survey of 750 manufacturing firms in several industries, including both big and small companies. Here is a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
White House Proposes Ban of Chinese, Russian Connected Vehicles and Software The Department of Commerce on Monday announced it is proposing a rule which would ban the sale or import of connected vehicles containing specific software and hardware produced by China or Russia or with a “sufficient nexus” to them. While it has national security […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We already know that water plants (another one in Kansas was attacked this week), power and healthcare are under constant attack. The industries and the government are paying attention to these with some limited success, but at least it is on everyone’s radar. One sector that has tried to stay out of the spotlight but […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I know I sound like a broken record, but as businesses start to improve their internal security, attackers focus on compromising businesses’ supply chains. In the case of the Hezbollah attack, the attackers must have, some how, known (a) that they were buying new walkie-talkies and pagers, (b) who they were buying them from, (c) […]
Continue reading →
[DISPLAY_ACURAX_ICONS]