Ransomware of $1 Million Crushes Company

Ransomware of $1 Million Crushes Company
by Matthew Rosenquist on 06-23-2017 at 12:00 pm

A South Korean web hosting company struggles for survival after agreeing to pay a ransomware extortion of $1 million to hackers.

New Record for Ransomware
Nayana, the South Korean web hosting firm, suffered a ransomware attack that resulted in 153 infected Linux servers. The resulting data that was encrypted by the malware impactedRead More


Cybersecurity in the World of Artificial Intelligence

Cybersecurity in the World of Artificial Intelligence
by Matthew Rosenquist on 05-17-2017 at 12:00 pm

Artificial Intelligence (AI) is coming. It could contribute to a more secure and rational world or it may unravel our trust in technology. AI holds a strong promise of changing our world and extending compute functions to a more dominant role of directly manipulating physical world activities. This is a momentous step where we … Read More


The Real Lesson from the AWS Outage

The Real Lesson from the AWS Outage
by Matthew Rosenquist on 03-08-2017 at 7:00 am

The embarrassing outage of Amazon Web Services this week should open our eyes to a growing problem. Complex systems are difficult to manage, but if they are connected in dependent ways, a fragile result emerges. Such structures are subject to unexpected malfunctions which can sprawl quickly. One of the most knowledgeable technologyRead More


Adaptation or Crisis – Will Security Save Technology

Adaptation or Crisis – Will Security Save Technology
by Matthew Rosenquist on 02-18-2017 at 12:00 pm

The technology landscape is rapidly changing how we interact and live in our world. The variety of Internet of Things is huge and growing at a phenomenal pace. Every kind of device imaginable is becoming ‘smart’ and connected. Entertainment gadgets, industrial sensors, medical devices, household appliances, and personal assistantsRead More


Cyber Risks Compound with Technology Adoption

Cyber Risks Compound with Technology Adoption
by Matthew Rosenquist on 01-12-2017 at 7:00 am

AAEAAQAAAAAAAAj AAAAJDQwNjJmNmEzLTc4NmQtNDM2My1hZTJiLTVkYTg3YjU3ODVkMg

Just how reliant are we on computing infrastructure? Sometimes it takes just a little outage to get a taste of the interwoven dependency we don’t readily see.

It can be small. The international travelers landing in U.S. airports on January 3rd, one of the busiest travel days of the year, found themselves stuck in long lines due to … Read More


What Does Ransomware Sound Like?

What Does Ransomware Sound Like?
by Matthew Rosenquist on 12-25-2016 at 7:00 am

Congratulations to the multinational government agencies involved in the takedown of the Avalanche cybercriminal infrastructure! The U.S. Attorney’s Office, FBI, Europol, German Police, and others from over 40 countries were involved in disrupting one of the largest support structures for malware, digital money laundering,… Read More


Floki Bot is Becoming an International Sensation with Cybercriminals

Floki Bot is Becoming an International Sensation with Cybercriminals
by Matthew Rosenquist on 12-22-2016 at 7:00 am

Floki Bot, a new financial oriented malware, is popular with English, Portuguese, and Russian speaking underground criminal markets, winning over cybercriminals with new features and functionality. It is currently being used by a number of different cybercrime groups around the world and is being sold on the dark market for… Read More


The New Reality for IoT Security

The New Reality for IoT Security
by Matthew Rosenquist on 11-28-2016 at 4:00 pm

Recent Distributed Denial of Service (DDoS) attacks are forcing a shift in Internet-of-Things (IoT) security thinking. The dangers are expanding as attackers are taking advantage of billions of IoT devices, conscripting them into their botnet armies for massive DDoS attacks.… Read More


New IoT Botnets Emerge

New IoT Botnets Emerge
by Matthew Rosenquist on 11-06-2016 at 12:00 pm

On the heels of severe Distributed Denial of Service (DDoS) attacks, new Internet-of-Things (IoT) powered botnets are emerging. There are already hundreds of such botnets which exist in the underground hacking ecosystem, where services, code, and specific attacks can be purchased or acquired. New botnets are being developed… Read More


Let’s Talk About Cyber Risks

Let’s Talk About Cyber Risks
by Matthew Rosenquist on 11-06-2016 at 7:00 am

In the last 12 months, we have seen an unprecedented number of cyber-attacks occur or come to light. Sophisticated attacks against governments, businesses, consumers, and the pillars of the Internet itself. The future appears to be fraught with run-away risks. Can security tame data breaches, ransomware, massive DDoS assaults,… Read More