U.S. Agricultural Machinery Manufacturer Hit with Ransomware AttackNew!!
This week, AGCO, a U.S. agricultural machinery manufacturer, suffered a ransomware attack that affected its business operations and shut down its systems. AGCO, headquartered in Duluth, Georgia, designs, produces, and sells...
Joint Cyber Alert Urges Organizations to Patch Known Vulnerabilities
As we have pointed out before, it is cumbersome yet critical, to patch vulnerabilities on a timely basis. Cyber-attackers move swiftly to take advantage of known vulnerabilities and are aware of...
Patch Tuesday Release Includes Fix for Actively-Exploited Flaw
Microsoft released its monthly patches this week to fix 128 vulnerabilities, including 10 rated as critical, 115 as important, and three flagged as moderately severe. One of the vulnerabilities (CVE-2022-24521 Windows...
Update on OFAC Cyber Sanctions List: Hydra and Garantex
On April 5, 2022, the U.S. Department of Treasury Office of Foreign Assets Control (OFAC) sanctioned darkweb Hydra Marketplace and virtual currency Garantex and added both to the Specially Designated Nationals...
Vishing Continues to be a Risk Worth Assessing
Phishing, Smishing, Vishing, and QRishing. All of these schemes continue to pose risk to organizations that needs to be assessed and addressed. Vishing made a strong debut during the pandemic [view...
NIST Releases Request for Information to Improve Cybersecurity Framework and Supply Chain Risk Management
The National Institute of Standards and Technology (NIST) recently released a Request for Information (RFI) that seeks to gather information to help evaluate and improve cybersecurity resources for the cybersecurity framework...
Twenty Most Common Passwords Leaked to the Dark Web: Is Your Password on the List?
Do you use 123456 as a password? We hope not, as it was the number one most common leaked password on the dark web according to a recent article from cnbc.com....
Don’t Wait for the Perfect Time for a Tabletop Exercise
Threat actors don’t wait for a convenient time to attack your company. They attack when it suits them, and when they can find any small opening. Being prepared for different types...
Health Care IoT Devices Pose Risk to Patient Care
As if health care entities don’t have enough to worry about during this chaotic and difficult time in the pandemic, a new report released by Cynerio, entitled “The State of IoMT...