For the second time, the FBI wiped malware off of user’s systems without asking and maybe without telling them. The first time was during last year’s Microsoft Exchange attack. This time they targeted the Russian Cyclops Blink malware. It is attributed to Sandworm, also known as Fancy Bear and APT28. Sandworm is believed to be […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hackers Hack Russia’s Largest State Owned Media Corporation Hackers stole 20 years of communications including almost a million emails from the All-Russia State Television and Radio Broadcasting Company (VGTRK). Those emails were published by DDoSecrets. VGTRK runs 5 national TV stations, 5 radio stations and numerous propaganda outlets. The data is available for download as […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Payment Card Industry (PCI) council is an industry group that includes the large credit card issuers and they have, for years, owned a standard called the PCI Data Security Standard or PCI DSS. While complying with it is not a law (except in a couple of states), complying with it is a contractual requirement […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Trump administration effectively eliminated the cybersecurity role in the State Department several years ago by eliminating its leader and burying the function in the State Department bureaucracy. Their theory was that the White House National Security function could assume the diplomatic role for cyberspace. Ultimately, that strategy failed and towards the very end of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
How Many Times Do I Need to Say – Crypto is Software, Software Has Bugs, Your Money is at Risk Decentralized Finance platform (DeFi) Revest Finance said that it lost $2 million due to a software bug and, oh yeah, (a) the can’t recover the funds, (b) they do not have the money to cover […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hackers are creative if nothing else. Normally when police want data, they need to provide a subpoena or warrant, but that is not required in all cases. If there is a risk of imminent harm – life or death – the police can just ask a company for their data and they have to comply. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]