Which Ransomware Groups Should We Watch For in 2024?

3 Most Active Ransomware Groups in 2023 The three most active ransomware gangs in 2023 were LockBit 3.0, Alphv, and Cl0p. While these three were the primary contributors to the sharp increase in ransomware attacks in 2023, a significant [...]

Which Ransomware Groups Should We Watch For in 2024?2024-03-06T14:53:59-08:00

LockBit Attacks Major Taiwanese Semiconductor, Foxsemicon

In recent news, FoxSemicon has fallen victim to a cyber attack where the LockBit ransomware gang seized control of their website and left behind a message that read “If you don’t pay the ransom, the data will be published on [...]

LockBit Attacks Major Taiwanese Semiconductor, Foxsemicon2024-03-06T14:49:07-08:00

What is the “Black Basta Buster?”

The New Black Basta Decryptor In November of 2022, scientists from SRLabs developed a decryptor that takes advantage of a vulnerability in Black Basta ransomware. This new development allowed victims to retrieve their files at no cost.  Black Basta [...]

What is the “Black Basta Buster?”2024-01-26T13:21:23-08:00

Data leaks show ChatGPT Security and Privacy fall short

RunwayML (AI video App by Runway company), OpenAI ChatGPT and other AI application software on screen. On November 28, 2023, computer science researchers from Cornell University collaborated with Google DeepMind, UC Berkeley, and other institutions to release a [...]

Data leaks show ChatGPT Security and Privacy fall short2024-01-09T21:17:58-08:00

The Okta Ransomware Attack: Breaches and Repercussions

On October 20, 2023, Okta, a leading identity and access management provider, disclosed a major security breach. A stolen credential allowed unauthorized access to their support case management system, exposing sensitive data belonging to numerous customers. This incident, now dubbed [...]

The Okta Ransomware Attack: Breaches and Repercussions2023-12-20T15:48:56-08:00

Are You Phish Bait? Unmasking the Tactics That Target You

Phishing is a common type of social engineering attack that attempts to trick people into revealing confidential information, such as passwords, credit card numbers, or Social Security numbers. Phishing emails are often disguised as legitimate communications from people you [...]

Are You Phish Bait? Unmasking the Tactics That Target You2024-01-09T21:19:38-08:00

What Are The Most Common Passwords?

A password is security in its most standard and basic form. Passwords are a fundamental aspect of computer security and are used to protect sensitive information from unauthorized access.The idea is that only individuals who know the correct password should [...]

What Are The Most Common Passwords?2023-12-18T20:34:37-08:00

What is Cybersecurity Consolidation?

What is Cybersecurity Consolidation? Cybersecurity consolidation refers to the process of streamlining and centralizing various cybersecurity tools, solutions, and processes within an organization. This consolidation aims to improve the efficiency, effectiveness, and [...]

What is Cybersecurity Consolidation?2024-02-07T11:49:17-08:00

Business Email Compromise: The Easiest Route for Threat Actors

BEC, or Business email compromise, is a type of cybercrime that involves attackers manipulating or compromising business email accounts for fraudulent purposes. BEC scams are designed to deceive individuals or organizations into making [...]

Business Email Compromise: The Easiest Route for Threat Actors2024-02-07T11:52:12-08:00

Real Risks of Penalties from Failure of HIPAA Compliance

The Health Insurance Portability and Accountability Act (HIPAA) was signed into law close to three decades ago. HIPAA was initially comprised of two primary rules: (1) The Privacy Rule, which establishes standards to protect individuals' medical records and other personal [...]

Real Risks of Penalties from Failure of HIPAA Compliance2023-12-14T12:18:46-08:00