Capitol attack’s cybersecurity fallout: Stolen laptops, lost data and possible espionage

When hostile actors penetrated the Capitol Building on January 6, they gained access to individual chambers and offices and remained at large within the Capitol complex for well over two hours. We have reports that items were stolen. One report Read More …

Disgruntled Former Employee Disrupted Shipments of Needed PPE During Pandemic

When the COVID-19 pandemic reached the United States last spring, a Georgia-based medical equipment packaging company worked to get personal protective equipment (PPE) to medical workers treating sick patients. But a disgruntled former employee thwarted those efforts at a time Read More …

FBI issues second alert about ProLock ransomware stealing data

The FBI issued a second warning this week to alert US companies of ProLock ransomware operators stealing data from compromised networks before encrypting their victims’ systems. The 20200901-001 Private Industry Notification seen by BleepingComputer on September 1st comes after the Read More …

Biometric data processing and storage system threats

Initially, digital biometric data processing systems were used primarily by government agencies and special services (police, customs, etc.). However, the rapid evolution of information technology has made biometric systems accessible for ‘civil’ use. They are increasingly becoming part of our Read More …

Cybersecurity And Financial Institutions: How New York’s “First-In-The-Nation” Data Security Regulations May Impact You

March 1, 2017 marked the implementation of New York’s cybersecurity regulations, subjecting covered financial institutions to arguably the most burdensome cybersecurity regime yet. The regulations, promulgated by the New York State Department of Financial Services (“NYDFS”), require banks, insurance companies, Read More …

76 iOS Apps, Including Medical and Banking Tools, Are Exposing Data to Hackers

Seventy-six popular apps in the Apple App Store are vulnerable to silent interception of TLS-protected data due to a poor implementation of the cryptographic protocol. According to researcher Will Strafach, who wrote on Medium, the apps are vulnerable to man-in-the-middle Read More …