Five Eyes Agencies: SolarWinds Hackers Adopting New Tactics As businesses move to the cloud, hackers are adopting new techniques since Software as a Service providers are much better at patching than most companies are. Instead, the Russian hackers are stealing authentication tokens and using them to get access to the cloud, including creating new accounts […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
FCC Bans Robocalls Using AI-Generated Voices This comes after someone generated thousands of robocalls pretending to be Joe Biden telling people not to vote. Unless they get express permission from the recipient of the call, which would, of course, defeat the purpose of the call. The FCC wrote the rule in a way that allows […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Police Don’t Know Who Accessed Data Posted in Error This is somewhat hard to believe while at the same time all too common. Would your company do any better. Police in Northern Ireland posted the entire country’s police roster in response to a freedom of information request – by accident. Even though they took it […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Senators Ask CISA to Investigate DJI Drones A bipartisan group of Senators is asking CISA to examine drones made by companies with deep ties to the Chinese government. DJI is the 800 pound gorilla in the high end consumer drone market, drones also used by businesses and government. While this makes sense, if they do […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Pornhub OnlyFans and Meta Join New Sextortion Prevention Platform This is actually pretty cool. The new service will allow a teenager (or anyone) that shared a nude image with someone who later posted it without their permission, to start the takedown process without having to send the sensitive image anywhere. They use the software to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hackers Claim They Breached T-Mobile More Than 100 Times in 2022 Three different cybercriminal groups claimed access to internal networks at communications giantĀ T-MobileĀ in more than 100 separate incidents throughout 2022, new data suggests. In each case, the goal of the attackers was the same: Phish T-Mobile employees for access to internal company tools, and then […]
Continue reading →
[DISPLAY_ACURAX_ICONS]