BeagleBoyz cybercriminals launch “FASTCash 2.0” to rob banks

North Korea's BeagleBoyz cybercriminals have launched an automated teller machine (ATM) cash-out scheme, known as FASTCash 2.0. Cyber experts from the U.S. government have detected the cyber activity over the past five years that led to nearly $2B loss to financial institutions around the world.

Continue Reading BeagleBoyz cybercriminals launch “FASTCash 2.0” to rob banks

FTC releases new video to help keep your small business safe from fraud

The Federal Trade Commission (FTC) has released a new video to help keep your small business safe from fraud. This is another video in a series of videos from the FTC Protecting Small Businesses playlist.

Continue Reading FTC releases new video to help keep your small business safe from fraud

Patch these 10 most commonly exploited vulnerabilities

U.S. government cybersecurity experts are providing guidance on the "top 10" most commonly exploited vulnerabilites. The alert helps highlight the importance of patching and prioritizing vulnerabilities with known exploits.

Continue Reading Patch these 10 most commonly exploited vulnerabilities

5 Good Cybersecurity Lessons Learned From FTC Law Enforcement Actions

Several years ago, the Federal Trade Commission (FTC) released a good video that is still highly relevent today. The video explains how companies can leverage NIST's Cybersecurity Framework to greatly improve security in their organization. In this article, we highlight the five key tenants from the framework and how they could have possibly prevented FTC action and penalties.

Continue Reading 5 Good Cybersecurity Lessons Learned From FTC Law Enforcement Actions

Guidelines for securing Content Management Systems

The Australian Cyber Security Centre (ACSC) has released new guidelines to assist organizations in securing Content Management Systems (CMS). The guidelines include good mitigation advice in areas of patching, account management, hardening and monitoring to name a few.

Continue Reading Guidelines for securing Content Management Systems