Ransomware as a Chaos Mechanism This version of ransomware doesn’t require much skill. Rather than encrypting files and demanding a ransom, they are just deleting as many files as possible and watching the chaos with some popcorn and beer. Even if the company has good backups, and many don’t, it can still cause downtime, supply […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
North Koreans Attacking Crypto With Social Engineering Because … that is where the money is. The FBI says they are using highly tailored, difficult to detect social engineering campaigns. In spite of the so-called technical expertise of these targeted companies these attacks are effective. Credit: The Record August Ransomware Attack Causes Stoli Vodka to File […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Global Police Crackdown Arrests 5,000, Shuts Down Sites A global police crackdown in June and July against illegal sports gambling led to thousands of arrests and website shutdowns while also disrupting scam centers and their related human trafficking and money laundering operations, Interpol reported Thursday. They arrested 5,100 people, recovered $59 million in proceeds and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Microsoft Confirms MMC Bug Being Exploited – No Patch I could tell you to patch the bug but, for the 23rd time this year, the bug is being exploited in the wild and there is no patch. The bug, rated 7.8/10, is in the Microsoft Management Console tool and it was not among the 119 […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
People often ask me how come the hackers seem to be winning in spite of the seeming endless spend on cybersecurity, security training and law enforcement. Let me give you a couple of recent news items and see if you can figure it out. These are just a few of the hundreds and hundreds of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Earlier this month the Los Angeles Unified School District (LAUSD) was hit by a cyber attack. The breach affected 24 million students and about 50,000 teachers. Now we are learning more about it. For students, the data includes: For teachers, similar data was breached but more teacher specific data. Part of the problem is that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]