I talk a lot about the insider threat problem because it is prevalent and hard to stop. Cisco learned about that the hard way. Sudhish Kasaba Ramesh resigned from Cisco in April 2018. OK, good, time to move on. FIVE MONTHS LATER, he accessed Cisco’s infrastructure at Amazon and deployed code that shut down 16,000 […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While Russia is not the only country who wants to mess with our elections, the do have a lot of experience at it. During the 2016 and 2018 elections, they figured no one was minding the store, so they went about their disinformation campaigns very blatantly. After all, why bother to hide your actions if […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Ransomware is an Equal Opportunity Business As American businesses deal with ever increasing ransomware attacks, larger ransom demands and ransom and extortion wrapped up together, we are not alone. Not that the fact that we are not alone should make us feel better. A new Iranian hacker group is using Dharma ransomware to go after […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
August 13th, a Day That Will Live in Confusion August 13th is the day that Part B of Section 889 of the 2019 National Defense Authorization Act went into effect. It bans the use of equipment and services tied to certain Chinese companies that have been deemed security threats by the United States. Companies that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
China and Russia Continue to Interfere with the Elections According the the White House, China has been targeting the US election infrastructure ahead of the election and Russia has been trying to undercut Democratic candidate Joe Biden, much like their did with Clinton in 2016. Could it be that Russia thinks that the Republican Administrations […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As hackers got better, so did developers. Multi-Factor authentication, a technique which requires something that you know, like a password and something that you have, like an SMS message on your phone, makes the lives of crooks harder, but far from impossible to attack and here is why. One way this is done is via […]
Continue reading →
[DISPLAY_ACURAX_ICONS]