720-891-1663

Software Makers May Face Greater Liability in Wake of MOVEit Lawsuit

In light of one of the largest breaches in recent history – the MOVEit supply chain attack – it is possible new case law may be developed. The typical lawsuits that come out of breaches are damage claims from victims who say that the breach of their data caused them pain and suffering. Except that […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending August 25, 2023

US Warns Other Countries Hack Satellites Like We Do Last week I wrote about US Space Force bragging that they set up a new team to hack adversaries satellites and ground infrastructure. This week the Air Force and NCSC published an advisory that, guess what, other countries are doing the same thing and if the […]

Continue reading → [DISPLAY_ACURAX_ICONS]

House Repubs Call For More Cyber Regulation of Federal Contractors

The Chair of the House Oversight Committee’s cybersecurity subpanel says the bill, titled the Federal Cybersecurity Vulnerability Reduction Act, would play a crucial role in protection the nation’s digital infrastructure. The bill doesn’t actually require federal contractors to improve security. Instead, it will require all federal contractors, potentially even 1 person companies, to set up […]

Continue reading → [DISPLAY_ACURAX_ICONS]

You Know Those Badges That Open Doors – They are not Secure and Neither is the Replacement

Most of us have either used or seen others use that badges to unlock doors either at homes or offices. Most of these use a technology called Wiegand Wire. Compared to your average key, it is more secure and it does leave an audit trail, but the badges are easily cloned using devices available on […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Hackers Selling Access to Multi-Billion Auction House

The hacker business is like any other business. There are specialists. In the hacking business, one of the specialties is initial access. Initial access brokers break in to businesses and “collect” credentials. They don’t use those credentials. That is a different specialty. Researchers say that they studied Russian language hacker forums for a few months […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Boston’s Transit Authority – Lessons Learned, Maybe

In 2008 a group of MIT students were going to present a paper at the hacking convention Defcon on vulnerabilities in the Boston Transit (called the MBTA) fare card. The MBTA sued Defcon and the presentation was cancelled. But not before the slides for the presentation were published online. While this is an alternative to […]

Continue reading → [DISPLAY_ACURAX_ICONS]