CyberSecurity Blog

Nigerian Man Admits to $1.3M Business Email Compromise Scam

Scammers Used Malware and Spoofed Domain Name to Trick UK Financial Services Firm A Nigerian national has pleaded guilty to participating in a business email compromise scheme that stole $1.25 million from a Boston investment firm. Perpetrators used malware to intercept an employee’s emails as well as spoofed email accounts to trick the employee’s London…
Read more

Spanish Police Arrest 3 Behind Payment Card Fraud

Cybercrime Group Defrauded Nearly 200,000 Euros Spanish police estimate that a group that mainly targeted ATMs of Spanish national banks using cloned payment cards had fraudulently pocketed nearly 196,000 euros. Authorities arrested three members of the group Sunday in the Spanish coastal city of Valencia.http://dlvr.it/StKQkc

Colorado Warns Ransomware Attack Caused Massive Data Breach

Information From 2004 to 2020 Exposed for High School Students, Teachers and Others Colorado’s Department of Higher Education is warning that it suffered a ransomware attack in June, in which attackers stole personal data on current and past students and teachers, dating from 2004 to 2020. While the state has yet to wrap its probe,…
Read more

White House Pushes Cybersecurity Defense for K-12 Schools

Educators Gird For Fresh Ransomware Attacks as Students Set to Return to School The Biden administration says it wants to get ahead of ransomware attacks against schools before K-12 education soon resumes for the fall. “We must take cyberattacks on our schools just seriously as we take physical attacks on critical infrastructure,” said Cindy Marten,…
Read more

Streamlining Business Operations: Unlocking the Potential of Modern Workflow Optimization

ICYMI: Have you found your team’s workflow needs improvement? Using current tools to improve workflow could help your business run better. These methods improve performance and boost productivity. Integration also takes less time …http://dlvr.it/StHJn0

Use Technology to Increase Sales and Conversions

Using technology in your business is more than just joining trends. For many companies, it is a must-do. Customer relationship management systems, AI, chatbots, email automation, and social media data can help …http://dlvr.it/StFfyG

California Hospital Chain Facing Ransom, Service Disruption

ICYMI: ‘IT Complications’ at Prospect Medical Holdings Shut Down Ambulances, Appointments A ransomware attack has forced a California-based hospital chain to divert ambulances from its emergency rooms and cancel appointments for services. The group of 17 hospitals, 166 outpatient clinics and various doctor practices is still recovering after an IT systems shutdown.http://dlvr.it/StFc7k

Gmail Update Simplifies Scheduling Meetings

ICYMI: Scheduling a meeting is not the most enjoyable task. You email someone to find a time. They respond with several alternatives. You choose one. They confirm. There is a lot of communication …http://dlvr.it/StFZDP

US CISA Urges Improvements to Key Computer Component

ICYMI: Unified Extensible Firmware Interface Should Be More Secure, Says Agency The U.S. government is urging computer manufacturers to improve the security of firmware architecture that boots up devices after a powerful bootkit sparked concerns over permanent malware infections. Among its recommendations are that all UEFI developers implement dedicated PKI for updates.http://dlvr.it/StCYY6

How AI-Driven Identity Security Enables Clinician Autonomy

ICYMI: Healthcare entities are “stressed,” in the words of SailPoint’s Rob Sebaugh, and identity security in particular has taken a steep toll. But modernization, led by AI-driven identity security, can help reduce risk and even enable new levels of clinician autonomy.http://dlvr.it/StCFj9