Blog

Home  Blog

Washington Man Admits to Role in Multiple Cybercrime, Fraud Schemes

A Washington man has admitted in court to being involved in multiple fraud schemes that caused losses of more than $600,000. The man, Marco Raquan Honesty, 28, admitted that, throughout 2021 and into 2022, he engaged in COVID relief fraud, smishing scams, bank account takeover, forged money orders, and other fraud schemes. Honesty engaged in […]

Explore More

Social Media Security Firm Spikerz Raises $7 Million

Social media security startup Spikerz last week announced raising $7 million in a seed funding round. The investment was led by Disruptive AI, with participation from previous investor Horizon Capital, as well as Wix Ventures, Storytime Capital, and BDMI. Spikerz said the funding will enable it to accelerate the development of its platform, expand its […]

Explore More

Details Disclosed for Mercedes-Benz Infotainment Vulnerabilities

Kaspersky has disclosed the details of over a dozen vulnerabilities discovered in a Mercedes-Benz infotainment system, but the carmaker has assured customers that the security holes have been patched and they are not easy to exploit. Kaspersky’s research of the Mercedes-Benz head unit, called Mercedes-Benz User Experience (MBUX), built on previous research conducted by a […]

Explore More

FCC Taking Action in Response to China’s Telecoms Hacking

The Federal Communications Commission has adopted a declaratory ruling requiring telecommunications providers to secure their networks against cybersecurity threats. The ruling, for which the FCC currently seeks public comment, will also require wireless carriers to submit annual certification to the commission, proving that they have a cybersecurity risk management plan in place. “There is a […]

Explore More

CISA, FBI Update Software Security Recommendations 

The US cybersecurity agency CISA and the FBI have updated their guidance on risky software security bad practices to include the feedback received during a public comment period. Called Product Security Bad Practices, the guidance provides an overview of the security practices considered exceptionally risky, provides recommendations on addressing them, and urges makers of software […]

Explore More

HPE Investigating Breach Claims After Hacker Offers to Sell Data

HPE has launched an investigation after a well-known hacker announced the sale of information allegedly stolen from the tech giant’s systems. The notorious hacker IntelBroker announced on January 16 on a cybercrime forum that he is selling files obtained from HPE systems.  The compromised data allegedly includes source code for products such as Zerto and […]

Explore More

US Government Agencies Call for Closing the Software Understanding Gap

The cybersecurity agency CISA and other government agencies are calling to action for the US to take the necessary steps to improve cybersecurity by closing the software understanding gap. This gap is the result of manufacturers building software that mission owners and operators lack the adequate capacity to verify, meaning that they cannot fully understand […]

Explore More

Let’s Work Together!
Just Drop Us a line - [email protected]

Subscribe to our Newsletter

copyright 2024 by Digital Creations LLC