Skip to Content

Bitzlato Virtual Currency Exchange Taken Down in International Effort

The digital infrastructure of the Bitzlato virtual currency exchange was taken down in an international operation involving authorities from the US, France, Belgium, Cyprus, Portugal, Spain and the Netherlands. Authorities said that nearly half of Bitzlato’s transactions were tied to criminal activity. Five people have been arrested in all: three in Spain, one in Cyprus, …

Read More about Bitzlato Virtual Currency Exchange Taken Down in International Effort

FAA Statement on NOTAM Outage (January 19, 2023)

In a January 19 statement, the US Federal Aviation Administration (FAA) said that according to a preliminary review, “contract personnel unintentionally deleted files while working to correct synchronization between the live primary database and a backup database. The agency has so far found no evidence of a cyber-attack or malicious intent.” The statement also notes …

Read More about FAA Statement on NOTAM Outage (January 19, 2023)

Federal Agencies Do Not Implement Majority of GAO’s Cybersecurity Recommendations

According to a new report from the US Government Accountability Office (GAO), US federal agencies have implemented just 40 percent of the 335 cybersecurity recommendations made by GAO since 2010. The report, Cybersecurity High-Risk Series: Challenges in Establishing a Comprehensive Cybersecurity Strategy and Performing Effective Oversight, is the first of four planned reports examining the …

Read More about Federal Agencies Do Not Implement Majority of GAO’s Cybersecurity Recommendations

Apple Updates Include Backported Fix for iOS Vulnerability

Apple released fixes for multiple security issues in iOS and macOS, including a remotely exploitable zero-day flaw in iOS. The type confusion issue in Apple WebKit browser engine was deemed serious enough to prompt Apple to release updates for older versions of iOS. Note Impressive from Apple to release an update for hardware released 10 …

Read More about Apple Updates Include Backported Fix for iOS Vulnerability

Some MSI Motherboards Do Not Have Secure Boot Enabled by Default

Security researcher Dawid Potocki discovered that more than 300 motherboard models from MSI do not implement the Secure Boot feature by default, which means that they will allow any bootloader, signed or unsigned, to run. According to an MSI Reddit post, the company says they “preemptively set Secure Boot as Enabled and ‘Always Execute’ as …

Read More about Some MSI Motherboards Do Not Have Secure Boot Enabled by Default

Indian Education App Exposed Student and Teacher Data

The personal information of students and teachers in India was exposed on the Internet for more than a year. The Digital Infrastructure for Knowledge Sharing (Diksha) app stored the data on an unprotected Azure cloud server. Diksha has made data privacy news before: last year, a report from Human Rights Watch found that the app …

Read More about Indian Education App Exposed Student and Teacher Data

Report: Ransomware Victims are Refusing to Pay

Studies from two security firms suggest that ransomware victims are increasingly refusing to pay the attackers’ demands. According to Chainalysis, ransomware payments fell from $766 million in 2021 to $457 in 2022. Coveware reports that 76 percent of ransomware victims paid the ransom demands in 2019, while that figure fell to 41 percent in 2022. …

Read More about Report: Ransomware Victims are Refusing to Pay

HUMAN Security Takes Down Vastflux Ad Fraud Operation

Researchers from HUMAN have taken down a sizeable ad fraud scheme that spoofed more than 1,700 apps and managed to generate 12 billion ad requests a day. By injecting JavaScript into the ads, the scammers were able to layer multiple ads, registering views for ads that users did not see. HUMAN dubbed the malicious campaign …

Read More about HUMAN Security Takes Down Vastflux Ad Fraud Operation

FBI links Harmony’s $100 million hack to the Lazarus Group

The FBI has formally attributed the hack of the Harmony cryptocurrency bridge platform to Lazarus, a cyber-espionage group working for the North Korean government. The Harmony crypto-heist took place on June 23, 2022, and resulted in the theft of $100 million in cryptocurrency assets. Less than a week after the incident, blockchain tracking company Elliptic …

Read More about FBI links Harmony’s $100 million hack to the Lazarus Group

How cloud maturity will impact print and digital convergence in the workplace

This article analyses the cloud opportunity and gives recommendations and guidance for managed print services (MPS) providers that are expanding their cloud-based offerings. It reveals the demands and objectives of organisations with a more advanced cloud strategy and shows how their behaviour is distinct from companies that are more inclined to keep IT infrastructure and …

Read More about How cloud maturity will impact print and digital convergence in the workplace

Ransomware Attacks: Strategies for Prevention and Recovery

This article could start by reviewing the college that closed permanently after a ransomware attack or the large school district that suffered an incident during a recent holiday weekend. Or it could focus on how critical infrastructure—such as water treatment plants, pipelines, and meat processing plants—are increasingly under attack. We could even comment on the …

Read More about Ransomware Attacks: Strategies for Prevention and Recovery

Environmental, Social, Governance (ESG): Strategic Approaches to Thrive in the New Era of Risk and Compliance Management

This primer on operationalizing Environmental, Safety and Governance (ESG) goals explores the evolution of risk and compliance management, articulates the key role of ethics and compliance learning, and highlights the transformative power of platforms that connect risk management data with an ethical culture across the enterprise. In this article, ESG: Strategic Approaches to Thrive in …

Read More about Environmental, Social, Governance (ESG): Strategic Approaches to Thrive in the New Era of Risk and Compliance Management
Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

This site depends on revenue from ad impressions to survive. If you find this site valuable, please consider disabling your ad blocker.