Amazon Delays Office 365 Rollout Due to Security Concerns Depending on whether you are an optimistic or pessimist, you can assume what Amazon’s intentions are. Likely this is about trying to convince potential customers that Amazon is secure and Microsoft is not. While there is probably some truth to that, I think there is more […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
North Koreans Attacking Crypto With Social Engineering Because … that is where the money is. The FBI says they are using highly tailored, difficult to detect social engineering campaigns. In spite of the so-called technical expertise of these targeted companies these attacks are effective. Credit: The Record August Ransomware Attack Causes Stoli Vodka to File […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Microsoft Confirms MMC Bug Being Exploited – No Patch I could tell you to patch the bug but, for the 23rd time this year, the bug is being exploited in the wild and there is no patch. The bug, rated 7.8/10, is in the Microsoft Management Console tool and it was not among the 119 […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Alerts, Android, Breach, Business Continuity, Compliance, Hacks, Legal, Microsoft, News Bites, Privacy, Safety, Security Practices
AT&T is First Company To Evade SEC’s 4 Day Breach Disclosure No, they are not badasses, they asked for permission. The SEC rules that went into effect last year have a carve out from the disclosure rule – actually it is not an exception, just a delay. It is not clear who asked whom, but […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I don’t even know where to go with this other than to say, unfortunately, I am not surprised. Likely not patching a known bug is probably not illegal, as is not disclosing it. Roll back almost a decade, in 2016, whistleblower and security expert Andrew Harris was working for Microsoft. He was investigating a breach […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
DocuFakes on the Rise Hackers have figured out that anything that you do on autopilot is fertile ground for using to hack you. Case in point is Docusign. For some people, they sign so many docusign documents that they operate on autopilot when they see one. The hackers have really good templates, so that helps. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]