US Warns Other Countries Hack Satellites Like We Do Last week I wrote about US Space Force bragging that they set up a new team to hack adversaries satellites and ground infrastructure. This week the Air Force and NCSC published an advisory that, guess what, other countries are doing the same thing and if the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Chair of the House Oversight Committee’s cybersecurity subpanel says the bill, titled the Federal Cybersecurity Vulnerability Reduction Act, would play a crucial role in protection the nation’s digital infrastructure. The bill doesn’t actually require federal contractors to improve security. Instead, it will require all federal contractors, potentially even 1 person companies, to set up […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
NIST Special Publication 800-171 is the guide that all defense contractors must follow for protecting controlled unclassified information. It has been around since 2015 and has gone over several revisions. Revision 3 is the most recent and NIST has released the “initial public draft”. Expect a final draft this fall and a released version in […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Most of us have either used or seen others use that badges to unlock doors either at homes or offices. Most of these use a technology called Wiegand Wire. Compared to your average key, it is more secure and it does leave an audit trail, but the badges are easily cloned using devices available on […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Colorado AG Sends out “Welcome Letters” About CO Privacy Law Colorado AG Phil Weiser has sent out letters to businesses reminding them of their responsibilities under the Colorado Privacy Law. Likely the next letter won’t be so welcoming. Credit: Truyo White House Will Host Roundtable on Harmful Data Broker Practices At the roundtable, the CFPB […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The hacker business is like any other business. There are specialists. In the hacking business, one of the specialties is initial access. Initial access brokers break in to businesses and “collect” credentials. They don’t use those credentials. That is a different specialty. Researchers say that they studied Russian language hacker forums for a few months […]
Continue reading →
[DISPLAY_ACURAX_ICONS]