‘Killware’ – a Frightening Cybersecurity Threat

Anyone who lived before the 1980s or 90s through today knows that computer technology has steadily pervaded our lives in many aspects. One such aspect of this proliferation that quietly and seamlessly seeped into our lives is language—whether we expanded … Continue Reading

CISA Releases New Cybersecurity Tool

All too often a devastating data breach makes the news, whether it’s from a malicious outsider, an inside job, or a case of negligence. Every time one of these events occurs, it serves as a sobering reminder that an organization … Continue Reading

Port of Houston Fends Off Cyberattack

For thousands of years, civilizations have relied on maritime transport for goods and shipping. The Mediterranean Sea has been a busy area since Antiquity, including the Greeks, Egyptians, Romans, and Phoenicians. For centuries, routes in the Indian Ocean connected the … Continue Reading

Insider Attack Creates Chaos at Credit Union

Any casual observer of the news knows that data breaches have become more common. What typically makes the headlines involves multi-million dollar demands from ransomware, devastating cyberattacks against critical infrastructure, and the human cost when data involving innocent people is … Continue Reading

Rising USB-Borne Cyberattacks Raise Concerns

Portable USB storage drives give users a convenient way to move data between work and home, as well as among computers within an organization. This has been especially true during the COVID-19 pandemic, when stay-at-home protocols forced organizations to shift … Continue Reading

Secure Your Backups If You Use Microsoft Exchange

News related to the recent hack of Microsoft Exchange Server users is developing fast. In a recent blog post, Krebs on Security called the hack a ticking time bomb. In addition to the tens of thousands of users in the … Continue Reading

Cyberattack Targets Florida Water Supply

It’s the nightmare scenario for most cybersecurity analysts, and one that they’ve increasingly warned about in recent years. A hacker decides to target a critical piece of infrastructure, like a power plant or any of the 55 National Critical Functions … Continue Reading

Notorious Hacker Leaks MeetMindful User Data

Online dating sites have been a common target for hackers in recent years. Last week another company fell victim. A threat actor who goes by the moniker ShinyHunters leaked data from more than two million users of MeetMindful. The Denver-based … Continue Reading

Ransomware Attack Java

Task Force Seeks Framework for Ransomware Defense

The Institute for Security and Technology (IST) announced this week the creation of a Ransomware Task Force (RTF) to address what it called an “increasingly prevalent and destructive type of cybercrime.” The RTF brings together experts in industry, government, law … Continue Reading

Global Cybercrime Losses Top $1 Trillion

Computer security software company McAfee in partnership with the Center for Strategic and International Studies has released a new report that paints a grim picture of global cybersecurity threats. The Hidden Costs of Cybercrime surveyed 1,500 companies around the world … Continue Reading