Shoddy security practices. Short of cash. Lack of personnel to deal with threats. Outdated equipment connected to the Internet. Weak passwords. CISA and the FBI say these are just some of the issues that critical infrastructure operators are facing. Anti U.S. (pro-Russian) hackers are intensifying attacks on critical infrastructure such as water, wastewater, dams, energy […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Five Eyes Agencies: SolarWinds Hackers Adopting New Tactics As businesses move to the cloud, hackers are adopting new techniques since Software as a Service providers are much better at patching than most companies are. Instead, the Russian hackers are stealing authentication tokens and using them to get access to the cloud, including creating new accounts […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The help desk was operated by a third party. The hackers conned the help desk, it is reported, to reset all of the two factor methods that were set up to protect a super-admin account. They likely did this after they phished an employee for his/her userid and password. They used deceptive phone calls to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Dropbox says it was phished – simple as that. As a result, the attacker had access to 130 of its code repositories and downloaded a wide range of information. Dropbox has been very transparent about this, but it is both embarrassing and damaging to the company. The hackers socially engineered an employee to give up […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
How Many Times Do I Need to Say – Crypto is Software, Software Has Bugs, Your Money is at Risk Decentralized Finance platform (DeFi) Revest Finance said that it lost $2 million due to a software bug and, oh yeah, (a) the can’t recover the funds, (b) they do not have the money to cover […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
9 Years of AMD Processors Vulnerable to 2 New Side-Channel Attacks AMD processors from as early as 2011 to 2019 carry previously undisclosed vulnerabilities that open them to two new different side-channel attacks, according to a freshly published research. Known as “Take A Way,” the new potential attack vectors leverage the L1 data (L1D) cache […]
Continue reading →
[DISPLAY_ACURAX_ICONS]