In light of the recent admission that the US Treasury Department was among the organizations compromised when vendor BeyondTrust was compromised, figuring out how to assess and doing the assessing of vendors, which today almost always includes technology, is clearly critical. A very large percentage of breaches we hear about involve vendors. For example: The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Marriott Hotels acquired the Starwood Hotel chain in 2016. Two years prior to the acquisition, hackers broke into Starwood’s systems. Marriott didn’t figure out that Starwood was compromised until two years after they acquired the chain. The only reason they figured it out then was they were migrating Starwood to Marriott’s system and discovered the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Important notes: Contact us if you need assistance *** NOTICE TO THE CMMC ECOSYSTEM *** 16 December 2024 CMMC Reaches Significant Program Milestone Today Updated guidance for the Ecosystem and defense contractors as CMMC Title 32 Final Rule enters into force The Cyber AB is recognizing today’s effective date of the Department of Defense’s codification […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
AI is great. Of course, anything that is great has to be immediately abused by hackers. Here are few popular AI based scams. VOICE CLONING If a hacker has 3 seconds of your voice, that is enough to clone it. Typically, they use calls of a loved one supposedly in distress, like in the hospital, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While this particular study talks specifically about cryptocurrency companies, the trends are obvious and the impact to you and me are, unfortunately, similar. First what the crypto folks are seeing. 57 percent of crypto companies report audio deepfake incidents. 53 percent of crypto companies have encountered video deepfake fraud. This points to the very rapid […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In some sense this is not news. Given the West’s pressure on Russia since Ukraine, Russia would love to stick it to us. They tried hacking election systems in 2016 and a little bit in 2020, but even if they were successful, the impact was too isolated to make a difference. So a new strategy. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]