The Latest Blogs
Ransomware: Why banning payment can cause serious ramifications!
I want to start this off by stating that the threat actors that conduct these attacks must be stopped and I hope one day we will be able to make that happen. Ever since the Colonial Pipeline ransomware attack, federal and state lawmakers are proposing laws that would...
Lock your Windows! Lock your doors! … And Printers?
The CERT Coordination Center has released a VulNote identifying a critical remote code execution vulnerability with Windows Print Spooler service. That's right, those big clunky machines of yesteryear are now the nightmares of today, even more so than usual. This...
Close The Front Door Open A Back Window
I was asked recently during an interview, “In two minutes, can you tell me why many organizations are not prepared for cyber threats?” The answer is simply this: The world has changed. The threat actors have become far more sophisticated in how an attack is...
Lack Of Multi-factor Authentication Caused Colonial Pipeline Breach
Last month, hackers infiltrated Colonial Pipeline’s computer network, which resulted in the massive shutdown of its pipeline. The pipeline provides nearly one half of the fuel supply for the Southeastern United States. Colonial Pipeline elected to pay a ransom demand...