The Cybersecurity & Infrastructure Security Agency (CISA) issued the Cybersecurity Incident & Vulnerability Response Playbooks: Operational Procedures for Planning and Conducting Cybersecurity Incident and Vulnerability...more
CYBERSECURITY -
November's "Patch Tuesday" Includes 55 Patches -
Staying current with Microsoft’s monthly patches is challenging, yet critical for one’s cybersecurity program. This week, Microsoft’s November Patch...more
11/12/2021
/ Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Hackers ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Microsoft ,
Network Security ,
Personally Identifiable Information ,
Shopify ,
Vaccinations ,
Vulnerability Assessments
The Cybersecurity and Infrastructure Security Agency (CISA) recently issued a Binding Operational Directive requiring all federal agencies to apply patches to new and old vulnerabilities that are being exploited in the wild....more
Staying current with Microsoft’s monthly patches is challenging, yet critical for one’s cybersecurity program. This week, Microsoft’s November Patch Tuesday released 55 patches, six of which were categorized as “critical,”...more
CYBERSECURITY -
FBI Warning: M&A Activity Targeted by Ransomware Groups -
The FBI issued a Private Industry Notification on November 2, 2021, warning companies that “ransomware actors are very likely using significant...more
11/5/2021
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Driverless Cars ,
Facebook ,
Facial Recognition Technology ,
FBI ,
Hackers ,
QR Codes ,
Ransomware ,
Vulnerability Assessments
The FBI issued a Private Industry Notification on November 2, 2021, warning companies that “ransomware actors are very likely using significant financial events, such as mergers and acquisitions, to target and leverage victim...more
11/5/2021
/ Corporate Sales Transactions ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
FBI ,
Hackers ,
Information Technology ,
Investment Opportunities ,
Personally Identifiable Information ,
Ransomware ,
Risk Management ,
Vulnerability Assessments
Coveware recently issued its 2021 Q3 Ransomware blog article, which notes that ransomware attackers are “moving away from big game hunting” and are moving to the middle market. ...more
We have previously alerted you to vishing and smishing schemes. A new scheme, using QR codes, is called QRishing or quishing. According to security company Abnormal, between September 15 and October 13, 2021, it identified a...more
In a blog post entitled “New activity from Russian actor Nobelium,” Microsoft’s V.P. of Customer Security & Trust Tom Burt discussed a recent alert issued by the Microsoft Threat Intelligence Center (MSTIC) regarding the...more
10/29/2021
/ Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Hackers ,
Information Technology ,
Microsoft ,
Phishing Scams ,
Popular ,
Risk Management ,
SolarWinds ,
Supply Chain ,
Third-Party Service Provider ,
Vulnerability Assessments
The Cybersecurity & Infrastructure Security Agency, the Federal Bureau of Investigation, and the National Security Agency recently issued two joint alerts to critical infrastructure entities—one addressing BlackMatter...more
10/27/2021
/ Critical Infrastructure Sectors ,
Cybersecurity ,
Data Protection ,
FBI ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Information Technology ,
National Security Agency (NSA) ,
Popular ,
Ransomware ,
Risk Mitigation ,
Vulnerability Assessments ,
Wastewater ,
Water
CYBERSECURITY -
Apple + Microsoft Release Patches for Identified Vulnerabilities -
This week, both Apple and Microsoft issued patches to fix serious zeroday vulnerabilities that should be applied as soon as possible. That...more
10/20/2021
/ Apple ,
Biometric Information ,
Biometric Information Privacy Act ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Drones ,
Hackers ,
Microsoft ,
Passwords ,
Popular ,
Ransomware ,
Russia ,
Vulnerability Assessments
This week, both Apple and Microsoft issued patches to fix serious zero-day vulnerabilities that should be applied as soon as possible. That means that if you have an iPhone or iPad, you may want to plug your phone or iPad in...more
If you think the Russians are only targeting U.S. companies and the defense industry, think again. The cyber war between Russia and the U.S. has escalated since the President threw down the gauntlet on Putin, and the...more
CYBERSECURITY -
Cyber Criminals Focusing on Clinics + Business Associates -
As hospital systems become more hardened to cyber-attacks, cyber criminals are focusing their efforts on smaller providers, such as outpatient...more
10/8/2021
/ Agribusiness ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Drones ,
Facebook ,
Farms ,
Google ,
Hackers ,
Instagram ,
Popular ,
Ransomware ,
Social Media ,
Vulnerability Assessments
Google Chrome, touted as the world’s most popular browser (you’ve made it when your brand becomes a commonly-used noun), has issued patches for zero-day vulnerabilities that it or external researchers have identified as being...more
As hospital systems become more hardened to cyber-attacks, cyber criminals are focusing their efforts on smaller providers, such as outpatient clinics, specialty clinics and business associates, according to a report by...more
10/7/2021
/ Business Associates ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Hackers ,
Health Care Providers ,
Health Clinics ,
Hospitals ,
Information Technology ,
Risk Management ,
Vulnerability Assessments
On September 22, 2021, the Federal Bureau of Investigations (FBI), the Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) issued a cybersecurity advisory alerting companies to the...more
10/1/2021
/ Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
FBI ,
Hackers ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Information Technology ,
National Security Agency (NSA) ,
Phishing Scams ,
Popular ,
Ransomware ,
Vulnerability Assessments
We have noted before how important it is to update the operating system (OS) on your mobile phone as soon as you receive notice from the manufacturer. This week, Apple issued an update to the iOS that is considered urgent....more
On August 25, 2021, the FBI issued a Flash Alert to warn companies, especially in the health care industry, about the proliferation of attacks by threat actors using Hive ransomware....more
9/2/2021
/ Cyber Attacks ,
Cyber Crimes ,
Data Breach ,
Data Protection ,
Hackers ,
Healthcare Facilities ,
Information Security ,
Phishing Scams ,
Ransomware ,
Risk Management ,
Vulnerability Assessments
According to a report issued on August 24, 2021, by Unit 42 of Palo Alto Networks Ransomware Groups to Watch: Emerging Threats, four emerging ransomware groups “are currently affecting organizations and show signs of having...more
8/27/2021
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Hackers ,
Information Technology ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
Risk Management ,
Vulnerability Assessments
CYBERSECURITY -
T-Mobile Clarifies Facts of Security Incident in Press Release -
There has been a flurry of reporting in the past few days on the T-Mobile customer data compromise, with allegations that the compromise...more
8/24/2021
/ Baby Products ,
California Consumer Privacy Act (CCPA) ,
Class Action ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Hackers ,
Information Governance ,
Personal Data ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
Smart Devices ,
T-Mobile ,
Vulnerability Assessments
Researchers at Heimdal Security have detected a new ransomware dubbed DeepBlueMagic. According to Heimdal, it is particularly concerning because it is able to disable security tools that companies have employed in order to...more
8/20/2021
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Hackers ,
Information Technology ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
Risk Management ,
Vulnerability Assessments
Mandiant, a division of FireEye, has reported that it has discovered a vulnerability in a software protocol that enables hackers to gain access to audio and visual data on smart devices including baby monitors and web...more
8/19/2021
/ Baby Products ,
Connected Items ,
Data Privacy ,
Hackers ,
Information Security ,
Information Technology ,
Internet of Things ,
Popular ,
Risk Management ,
Smart Devices ,
Software ,
Vulnerability Assessments
If you are an organization that uses Microsoft Office 365 as your email platform, be on the lookout for a new tricky phishing attack recently used by cyber criminals. ...more
8/4/2021
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Email ,
Hackers ,
Information Technology ,
Microsoft ,
Personally Identifiable Information ,
Phishing Scams ,
Popular ,
Risk Management ,
Vulnerability Assessments
CYBERSECURITY -
CISA Issues Alert on Top Exploited Vulnerabilities -
On July 28, 2021, the Cybersecurity & Infrastructure Security Agency (CISA) issued a cybersecurity alert entitled “Top Routinely Exploited...more
7/30/2021
/ Apple ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Drones ,
Hackers ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Malware ,
Popular ,
Vulnerability Assessments