Reliving November 2019, August 2021 and April 2022, opps we did it again and again. We got hacked. We feel the best of intentions, but wonder when T-mobile can stop the breaches. The newest breach saw a “bad actor” obtaining “limited types of information” from user accounts. T-Mobile shut down this bad actor’s access to the… Read More »T-Mobile, Travis Tritt said it when he sang “Best of Intentions”
The Safeguards Rule affects any company or entity that offers or supports financial services, for example, dealerships and other similar industries that collect customer financial data. The new guidelines were published on December 9, 2021, giving those impacted by the changes a year to comply with the new standards and objectives. Starting December 9, 2022, amendments… Read More »FTC Gramm-Leach-Bliley Act (GLBA)
Data exfiltration is the unauthorized transfer of data from a computer or network. It is a type of data leak, and it can happen through a variety of means. Common methods of data exfiltration include email, removable media, and file sharing. Data exfiltration is a serious concern for any organization that stores sensitive data. A data… Read More »How Data Exfiltration Works and Why You Should Be Worried
Story by Ravie Lakshmanan A China-based advanced persistent threat (APT) group is possibly deploying short-lived ransomware families as a decoy to cover up the true operational and tactical objectives behind its campaigns. The activity cluster, attributed to a hacking group dubbed Bronze Starlight by Secureworks, involves the deployment of post-intrusion ransomware such as LockFile, Atom Silo, Rook, Night… Read More »State-Backed Hackers Using Ransomware as a Decoy for Cyber Espionage Attacks
The Russian Federation has collected massive amounts of information about American businesses and citizens. The site is run on the Tor system. Cy-Quest Global managed to get partial information about a few companies that are listed on the site. The site has a brokerage company out of Pakistan that runs under the name United States business… Read More »Open Door site offers more than Business Intel
Positive Technologies analyzed the Q3 2021 and found that attacks and cyberespionage against individuals, Home Offices and residental have increased, along with attacks involving remote access malware (RATs). With this being said, the need for office type cybersecurity is needed for Home based offices and the families that share the network. In spite of a decline in… Read More »New finding show the need for Home Office protection.
Microsoft has cautioned Windows and Azure clients to stay watchful subsequent to noticing state-supported and digital criminals examining frameworks for the Log4j ‘Log4Shell’ defect through December. Uncovered by the Apache Software Foundation on December 9, Log4Shell will probably require a very long time to remediate on account of how error-logging software component is utilized in applications… Read More »Sadly, Microsoft warns Log4j attacks are on the rise
The RedLine information-stealing malware targets popular web browsers such as Chrome, Edge, and Opera. We tell clients to stop storing their passwords in browsers and to use a Locker. AhnLab ASEC warns that using the auto-login to get on to your sites is becoming a very large security problem affecting both organizations and individuals. AhnLab ASEC… Read More »RedLine making a b-line to your stored passwords
In what has been a bad 4 years of security issues for T-Mobile. The company reported another data breach around December 2021. It is not yet known how many people were affected by this latest T-Mobile Hack or how hackers managed to breach T-Mobile’s defenses again. The T-MO reported a number of leaked internal documents show… Read More »T-Mobile? Again, really?
Writen by: Jai Vijayan Security experts are now urging organizations to quickly update to a new version of the Log4j logging framework that the Apache Foundation released Tuesday because its original fix for a critical remote-code execution flaw in the logging tool does not adequately protect against attacks in some situations. According to the Apache Foundation,… Read More »Original Fix for Log4j Flaw Fails to Fully Protect Against DoS Attacks, Data Theft