Data from employment firm Automation Personnel Services Leaked Automation Personnel Services, a provider of temporary employment services, found 440 gigabytes of their data leaked on the dark web. The poster says that it includes payroll, accounting and legal documents. The data was leaked because the company refused to pay the ransom. When asked if the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Israeli insurance company Shirbit was hit by a ransomware attack last week. The hackers demanded 50 Bitcoin within 24 hours. 50 Bitcoin is about a million dollars. When they didn’t do that, the hackers started leaking the company’s data and doubled the ransomware demand to 100 Bitcoin or about two million dollars. They said that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
First the wise guy answers: Too Long and It Depends. Unfortunately, both are true. For a lot of companies, 30 to 60 days seems to be the average. Company size doesn’t seem to be a factor. We recently worked with a smallish company (less than 150 people) and it was 30 days before they were […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Oracle POS Back Door Discovered Oracle bought the Micros Point of Sale System a few years ago and now needs to deal with the challenges from that. The newest challenge is a modular back door that affects the 3700 POS series. It is used by hundreds of thousands of hotels, restaurants, bars and other hospitality […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I sort of stole Brian Krebs’ blog post title and then changed it completely for the counterpoint. Brian’s actual title (nothing against Brian; I have spoken with him multiple times; he is a good guy) is WHY Paying to Delete Stolen Data is Bonkers . In concept, I don’t argue with it. Brian’s claim is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Louisiana National Guard Called in to Help Local Election Officials According to tips, the state of Louisiana had to call out the National Guard after some number of small government offices across the state were hit by ransomware. Experts say the tools have the hallmarks of the North Koreans, so all of the major attackers […]
Continue reading →
[DISPLAY_ACURAX_ICONS]