Five Eyes Agencies: SolarWinds Hackers Adopting New Tactics As businesses move to the cloud, hackers are adopting new techniques since Software as a Service providers are much better at patching than most companies are. Instead, the Russian hackers are stealing authentication tokens and using them to get access to the cloud, including creating new accounts […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Flash – The Gift That Keeps on Giving Flash, that piece of garbage software that Adobe finally killed a few months ago and which, I have said, should have been killed 20 years ago, it turns out, is at the root of another supply chain hack. For many people, supply chain attacks first came to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This executive order is a big one – and very aggressive. Here is part 3 of what is in it. I am going to keep doing this until I get all the way through this almost 40 page document. In part 2, I provided the abridged version of section 4 of the EO. This is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]