720-891-1663

Cyberattacks Causing Physical Disruption on the Rise

At least 68 cyberattacks last year caused physical consequences to operational technology (OT) networks at more than 500 locations worldwide. Damage from these attacks ranged up to $100 millon. OT attacks are attacks on the systems that run businesses like manufacturing, transportation and the cities themselves. If you think about all of the computers that […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending June 10, 2022

Anonymous Seems to be doing Better Against Russia than Past Efforts Anonymous, the hacking collective, historically has made claims about how effective they are that have not panned out. However, against Russia, they seem to be pretty effective. Whether that means that they are more focused now or instead, that Russia’s defenses are not very […]

Continue reading → [DISPLAY_ACURAX_ICONS]

IoT Bug Could Lay Waste to Factories ….

When people talk about IoT – Internet of Things – these days, they are thinking of Amazon Alexa or Phillips Vue lightbulbs, but where IoT started was in factories and warehouses, decades ago. Industrial automation or IIoT is still where the biggest in IoT attacks lies. Today we learned about a critical remote code execution […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending May 28, 2021

The UK Might Beat Us to Regulating MSPs In the US, anyone can become a managed service provider. Unfortunately, customers may think that comes with security, but usually it does not. The UK is about to create a legally binding cybersecurity framework for managed service providers. This may be the first step at forcing businesses […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending February 26, 2021

DoD Working on CMMC-Fedramp ‘Reciprocity’ by Year End CMMC, the DoD’s new cybersecurity standard is designed to measure security practices of companies and the servers in the computer rooms and data centers. But what about the stuff in the cloud. That is covered by another government standard called FedRAMP. But those two standards have different […]

Continue reading → [DISPLAY_ACURAX_ICONS]

The Strategy is “Wait to get Hacked and then Panic”

As millions upon millions of IoT and Industrial IoT devices get deployed every month, we seem to have forgotten what we learned the hard way about our computers: if we don’t patch them, the hackers will invade. #1: A set of bugs called Urgent/11 affected a network module that has been around since the 90s […]

Continue reading → [DISPLAY_ACURAX_ICONS]