Europol Confirms Takedown of SMS-based FluBot Spyware
The action was prompted by the Android malware spreading aggressively through SMS around the world Read More
How Can We Strengthen the Cybersecurity of Critical Infrastructure? Here Are My Suggestions for CISOs, Regulators, Vendors – and All Citizens
A year after the ransomware attack against the Colonial Pipeline, what can we do to further harden the IT and OT systems of power plants,...
Logic bomb attacks: 4 famous examples
What is a logic bomb? A logic bomb is a piece of code left lying in wait on a computer that will execute under certain...
Connecticut Becomes Fifth US State to Enact Consumer Privacy Law
Connecticut Governor Ned Lamont officially signed into law the so-called Connecticut Privacy Act Read More
Twice as Many Healthcare Organizations Now Pay Ransom
Extorters focus their efforts on a perceived soft target Read More
CMMC 2.0: key changes
Introduction Since my previous blog CMMC Readiness was published in September 2021, the Department of Defense (DoD) has made modifications to the program structure and...
How to audit Microsoft Active Directory
If you have a traditional domain, it’s time to audit your Active Directory. In fact, it’s probably way past time. You probably have accounts that...
HiQ v LinkedIn court ruling will have a material effect on privacy
The lawyers continue to gather their billable hours as the legal tussle between data science company hiQ Labs and LinkedIn plays out in the United...
Nearly Three-Quarters of Firms Suffer Downtime from DNS Attacks
Digital transformation and remote working take their toll Read More
Euro Cops Bust $47m Money Laundering Operation
Funds were funnelled from invoice fraud and crypto scams Read More
