You moved your applications to the cloud. Now you don’t have to worry about managing IT systems. The headaches are someone else’s. Well sort of. Here is what customers of Quickbooks cloud hosting provider iNSYNNQ are seeing when they try to log on: This is what they have been seeing for the last three days. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Asus Was Not Alone I wrote about the Asus supply chain attack in March (search for Asus in the blog search box). Attackers, somehow, compromised the development environment, injected malware and allowed the system to compile, digitally sign and distribute it through the software update process. Hundreds of thousands of clients were infected as a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
U.S. Trains UAE Spies to Spy on Americans Reuters has written an expose on how the State Department granted a U.S. Company an ITAR license to train UAE spies on hacking. The plan, which got out of control, what to constraint the UAE spies, but once they were trained, they fired their U.S. trainers and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The FBI says that reported losses due to Business EMail Compromise attacks reached a whopping $1.3 billion in 2018, double the losses reported in 2017. On the other hand, the number of ransomware complaints is down to levels reported in 2014. There were 20,373 Business EMail Attacks reported last year, compared to 15,690 in 2017. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Aluminum Giant Norsk Hydro was hit with a ransomware attack this week. The attack has forced the company to shut down several plants and take other other plants offline to stop the spread of the attack. Other plants were operating in “manual” mode. The Norwegian company employs 35,000 employees in 40 countries. They report that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Jackson County Pays $400,000 in Ransomware Following a ransomware attack on March 1st, 2019, Jackson County, Georgia decided to pay hackers a ransom of $400,000. The county population is 67,000 according to Google. While hackers may not be explicitly targeting these small municipalities, they may be. After all, small municipalities likely have poor cybersecurity practices […]
Continue reading →
[DISPLAY_ACURAX_ICONS]