-
Securing Critical Infrastructure: What We’ve Learned from Recent Incidents
PRIVACY PRIVACY Learn about well-known vulnerabilities and attacks and how they affected critical infrastructure — from Phone Phreaking to recent ransomware. Cyberattacks against critical infrastructure are on the rise. The FBI’s Internet Crime Complaint Center (IC3) highlighted in its 2021 Internet Crime Report that 649 complaints of ransomware attacks were received from organizations in the…
-
5 key considerations for your 2023 cybersecurity budget planning
PRIVACY PRIVACY As CISOs look to prepare their 2023 security budgets, some might be asking themselves, “where do I begin?” There are such varied and rapidly changing facets of defending organizations against cyber threats that the task of sorting out which risks need the most attention can seem overwhelming. Nevertheless, security leaders need to begin…
-
Microsoft Patches Windows Zero-Day as Attackers Exploit it in the Wild
PRIVACY PRIVACY CISA has added the bug to its Known Exploited Vulnerabilities (KEV) list Read More
-
Critical Industries Failing at IIoT/OT Security
PRIVACY PRIVACY 93% of companies admit failure when implementing IIoT/OT security projects Read More
-
Top 10 Malware June 2022
PRIVACY PRIVACY The Top 10 malware lineup for June 2022 remained consistent with May besides the return of GravityRAT, Mirai, and QakBot. Read More
-
Ransomware Activity Resurges in Q2
PRIVACY PRIVACY Ransomware activity rose by 21% compared to Q1 2022, according to a new report Read More
-
Can My Phone Be Tracked If Location Services Are Off?
PRIVACY PRIVACY Your smartphone comes with built-in location services, which are useful if you lose it or if you use an app that needs to know your location. But what if you don’t want your phone to be tracked? Can the phone be located if you turn off location services? The answer is yes, it’s…
-
HavanaCrypt Ransomware Masquerades as a Fake Google Update
PRIVACY PRIVACY Researchers at Trend Micro have uncovered stealthy ransomware named ‘HavanaCrypt,’ which presents itself as a Google Software Update Read More
-
Ukraine’s Cyber Agency Reports Q2 Cyber-Attack Surge
PRIVACY PRIVACY The volume of cyber-attacks targeting the country has risen substantially over the second quarter of the year Read More
-
Post-Roe Privacy
PRIVACY PRIVACY This is an excellent essay outlining the post-Roe privacy threat model. (Summary: period tracking apps are largely a red herring.) Taken together, this means the primary digital threat for people who take abortion pills is the actual evidence of intention stored on your phone, in the form of texts, emails, and search/web history.…