An Example of RaaS

Ransomware as a service fosters a new malicious model We touched on ransomware as a service not too long ago, and we’ll dive back into this growing model by taking a look at more prominent RaaS kits. This trend highlights an alarming growth in malicious activity because it takes a franchises approach towards viruses and

An Example of RaaS Read More »

Apple’s New CSAM tech is a big “no thank you”

Dangerous privacy-invasive tech needs some serious rethinking An opinion piece by Douglas James. Advancements in tech raise questions about protecting privacy. It’s critical, especially in these times, we protect our personal lives and data. Not only from a cybersecurity standpoint. Unless you’re comfortable with the idea of invisible hands sorting through your precious, personal info,

Apple’s New CSAM tech is a big “no thank you” Read More »

New Bipartisan Senate Bill Creates Timeframe for Post-Cyberattack Reporting

What a new cyber bill could mean for critical infrastructure A bill introduced between members of the Senate (the Cyber Reporting Incident Act), specifically Gary Peters (Democrat, Michigan) and Rob Portman (Republican, Ohio) seeks to create a stricter timetable when reporting cybersecurity events. Specifically, after a breach regarding critical infrastructure. Owners and operators of enterprises

New Bipartisan Senate Bill Creates Timeframe for Post-Cyberattack Reporting Read More »