White House Preps New Cyber Rules for Healthcare After ChangeHealth Breach Anne Neuberger, Deputy National Security Advisor for Cyber says that after a decade of pleading with hospitals to protect your data, they are getting ready to roll out regulations. The hospitals say don’t penalize us by making us protect your data; why do we […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
First a little background. One of the main uses of cryptocurrency – not the only use – is to monetize crime. Most ransomware payments are done via cryptocurrency. There are other, legitimate uses, but they are dwarfed by the illegal uses. To the tune of tens of billions of dollars of criminal activity a year. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
TikTok Sues US Government; Vows to Prevail No surprise here and without taking a side pro or con; ByteDance and TikTok have filed suit in federal court arguing the law violates the US Constitution. TikTok’s CEO Shou Zi Chew says the company expects to win a legal challenge to block the new law. He says […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Cyberattack Ramifications: Chain Closes ALL STORES to Contain Attack Canadian pharmacy chain London Drugs has closed all stores to contain a cyberattack. While many stores stop accepting online orders or credit cards after a cyberattack, it is very rare to see a company stop doing business until further notice. However, they have not notified authorities […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Shoddy security practices. Short of cash. Lack of personnel to deal with threats. Outdated equipment connected to the Internet. Weak passwords. CISA and the FBI say these are just some of the issues that critical infrastructure operators are facing. Anti U.S. (pro-Russian) hackers are intensifying attacks on critical infrastructure such as water, wastewater, dams, energy […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Who would have guessed? Researchers at the University of Illinois Urbana-Champaign (UIUC) fed AI agents vague descriptions of more than a dozen unpatched vulnerabilities. The agent they created with GPT-4 exploited 87 percent of those vulnerabilities. Fourteen other agents made with lesser tools like GPT 3.5 and Metasploit failed. The researchers said that GPT-4 was […]
Continue reading →
[DISPLAY_ACURAX_ICONS]