The more one uses and shares on social media, the more information is publicly available for cyber attackers to use to exploit users’ personal and professional information.

It is hard for people to realize that every single thing shared on any social media platform is available for friends and foes alike to access and use.

The world has rallied around Ukraine since Russian forces invaded this past week, including, it seems, hackers. The hacktivist collective Anonymous, which gained prominence between 2008 and 2014 with a series of high-profile politically motivated cyber-attacks against such disparate groups as the Church of Scientology and PayPal, has come out of the woodwork once again

It was a crazy weekend for cyber-attacks. People seem surprised, but those of us in the industry aren’t surprised one bit. It is very logical and foreseeable that hackers are leveraging attacks that have maximum disruption on multiple victims, including third-party vendors and their customers. It is a “one-stop shop” strategy that is used every

The Division of Legislative Automated Systems, which provides IT services to the Virginia General Assembly (the Assembly), detected a ransomware attack on December 10, 2021, that included “extremely sophisticated malware” that affected all of its servers.

The attack comes right before the  Assembly  commences its session in January.

Governor Ralph Northam was briefed on the

Researchers at cybersecurity firm AlienVault have discovered a computer virus of North Korean origin which infects and hijacks computers in order to mine Monero, a private digital currency which styles itself as “secure, private and untraceable.” Cryptocurrency mining is the resource-intensive process by which computers or “miners” running specific software verify cryptocurrency transactions. In exchange for their computing power, miners are given small amounts of cryptocurrency. In the case of North Korean’s Monero malware, the virus installs mining software on infected computers unbeknownst to their owners or users. The software then secretly mines Monero and sends mining rewards back to a server located at Kim II Sung University in Pyongyang. Researchers are unsure how many computers may be affected.
Continue Reading Another Hitch in the Crypto Boom? North Korean Malware Hijacks Computers to Mine Monero Cryptocurrency

The 2016 Manufacturing Report by Sikich finds that there has been a progressive growth in cyber-attacks in the manufacturing sector. This is consistent with the most recent IBM/X-Force Research 2016 Cyber Security Intelligence Index, which  notes that the manufacturing industry represents the second most attacked industry, just behind health care.

Manufacturing companies often don’t believe