“Fake News” And How The Washington Post Rewrote Its Story On Russian Hacking Of The Power Grid

The control center of California’s power grid in 2001. (John Decker / Bloomberg News)

On Friday the Washington Post sparked a wave of fear when it ran the breathless headline “Russian hackers penetrated U.S.

The control center of California’s power grid in 2001. (John Decker / Bloomberg News)

Continue reading ““Fake News” And How The Washington Post Rewrote Its Story On Russian Hacking Of The Power Grid”

Meet The Russian Hacker Claiming She’s A Scapegoat In The U.S. Election Spy Storm

Twitter profile of Alisa Esage Shevchenko

Alisa Esage Shevchenko, as pictured on her Twitter profile. Her company is one of three sanctioned by the Obama administration for allegedly aiding Russian intelligence attacks on the U.S.

Twitter profile of Alisa Esage Shevchenko

Alisa Esage Shevchenko, as pictured on her Twitter profile. Her company is one of three sanctioned by the Obama administration for allegedly aiding Russian intelligence attacks on the U.S. election.

Continue reading “Meet The Russian Hacker Claiming She’s A Scapegoat In The U.S. Election Spy Storm”

Using Cyber Threat Intelligence to Make 5 Security Forecasts for 2017

I spend most of my time analyzing vast quantities of cyber threat data, looking for trends and insights that we can use to help our customers better prepare for what cyber threats are coming next.

I spend most of my time analyzing vast quantities of cyber threat data, looking for trends and insights that we can use to help our customers better prepare for what cyber threats are coming next. There are some clear trends that have emerged over the past 12 months that we can use to offer cyber security guidance and strategies in the coming year.

Continue reading “Using Cyber Threat Intelligence to Make 5 Security Forecasts for 2017”

U.S. Punishes Russia Over Election Hacks

President Barack Obama on Thursday unleashed a barrage of retaliatory measures against Moscow for meddling in the US election, imposing sanctions on two intelligence agencies, expelling 35 agents and shuttering two Russian compounds inside the United States.

President Barack Obama on Thursday unleashed a barrage of retaliatory measures against Moscow for meddling in the US election, imposing sanctions on two intelligence agencies, expelling 35 agents and shuttering two Russian compounds inside the United States.

Continue reading “U.S. Punishes Russia Over Election Hacks”

OSCE Confirms ‘Major’ Cyber Attack

The Organization for Security and Co-operation in Europe, an international election and war monitor, said Wednesday it had become the latest global institution to suffer a “major” cyber attack.

The Vienna-based OSCE has its origins in the Cold War but after 1991 it expanded and now has 57 member states including the United States, Russia and Ukraine.

The Organization for Security and Co-operation in Europe, an international election and war monitor, said Wednesday it had become the latest global institution to suffer a “major” cyber attack.

Continue reading “OSCE Confirms ‘Major’ Cyber Attack”

Serious PHP Issues Revealed by Flaws in PHPMailer, SwiftMailer

Experts have determined that the remote code execution vulnerabilities affecting the PHPMailer and SwiftMailer email-sending libraries are caused by PHP design flaws.

Researcher Dawid Golunski from Legal Hackers recently discovered that PHPMailer has a critical flaw that can be exploited by a remote, unauthenticated attacker for arbitrary code execution in the context of the web server user.

Experts have determined that the remote code execution vulnerabilities affecting the PHPMailer and SwiftMailer email-sending libraries are caused by PHP design flaws.

Continue reading “Serious PHP Issues Revealed by Flaws in PHPMailer, SwiftMailer”

Topps Customer Data Exposed After Website Hack

Topps this week sent out emails informing users that its website was hacked earlier this year and that personal information, including credit card data, was stolen.

The iconic maker of baseball another sports trading cards sent email notifications to potentially impacted users to inform them on the data breach and that personal information submitted to the Topps website (www.topps.com) might have been compromised.

Topps this week sent out emails informing users that its website was hacked earlier this year and that personal information, including credit card data, was stolen.

Continue reading “Topps Customer Data Exposed After Website Hack”

Rethink Your Cloud’s Biggest Blind Spot

The integration of the cloud into global Internet and business strategies is the critical next step towards our officially entering the Digital Age. Advances in how we gather, share, and consume information have not only transformed business, but also society itself.

The integration of the cloud into global Internet and business strategies is the critical next step towards our officially entering the Digital Age. Advances in how we gather, share, and consume information have not only transformed business, but also society itself. In fact, we are now so accustomed to change that we adopt it and adapt to it without a second thought. And we have to. If you take the time to think twice, you are likely to get run over by the next innovation, or get left hopelessly behind.

Continue reading “Rethink Your Cloud’s Biggest Blind Spot”

Balancing Cybersecurity Practices With The Realities Of Healthcare Operations

A thorough risk assessment is prudent for any organization, but is particularly essential for companies in the healthcare industry. Protecting patient data is important, and failing to have robust security measures can shut down facilities and have life-or-death ramifications.

A thorough risk assessment is prudent for any organization, but is particularly essential for companies in the healthcare industry. Protecting patient data is important, and failing to have robust security measures can shut down facilities and have life-or-death ramifications.

Continue reading “Balancing Cybersecurity Practices With The Realities Of Healthcare Operations”