technology
-
Consequences of Poor Data Privacy
Data privacy is not just a technical concern, it’s a cornerstone of trust between individuals and organizations. However, when data privacy is poorly managed, the consequences can be devastating. Here…
-
Incident Response using the NIST Guidelines
The National Institute of Standards and Technology (NIST) provides structured guidelines for incident response to help organizations effectively manage cybersecurity threats. These guidelines can be found in the framework for…
-
Enhancing GRC Efforts through Technology
By Jorge Castaneda Leveraging Technology and tools can help transform Governance, Risk, and Compliance Management. GRC is a crucial aspect of business operations, ensuring that organizations meet regulatory requirements, manage…
-
A Brief Understanding of Health Privacy and Privacy Torts – From an IT Perspective
By Jorge Castaneda Over the last several years, I’ve made it a point to get more educated and experienced with data privacy. I’ve read several books along the way, watched…
-
Why Multi-Factor Authentication is Essential for Online Security
By Jorge Castaneda We are online almost every day if not every day! Yet, a lot of people don’t take online security very seriously. Online security is more important than…
-
Amazon’s Plan for ‘Ultracluster’ Supercomputer
Amazon is collaborating with Anthropic, an AI company, to develop one of the world’s most powerful AI supercomputers, known as Project Rainer. This supercomputer will utilize hundreds of thousands of…
-
Storm-1811: Hacking RMM Tools To Spread Ransomware
The cybercriminal group Storm-1811 has been exploiting remote monitoring and management (RMM) tools, such as Microsoft’s Quick Assist, to deploy Black Basta ransomware. They initiate attacks by flooding victims’ inboxes…
-
Horns&Hooves: Campaign Targets Users and Retailers with RATs via Fake Emails
The “Horns&Hooves” campaign, active since March 2023, has targeted over 1,000 victims—primarily private users, retailers, and service businesses in Russia—by distributing remote access trojans (RATs) like NetSupport RAT and BurnsRAT.…
-
SpyLoan: 8 Million Android Users Targeted by Malicious Apps
Over 8 million Android users have been affected by malicious loan applications, collectively termed “SpyLoan,” available on the Google Play Store. These 15 apps, identified by McAfee Labs, deceptively promise…
-
Rockstar 2FA: A New Phishing-as-a-Service Threat Targeting Microsoft 365 Accounts
A new phishing-as-a-service (PhaaS) platform named ‘Rockstar 2FA’ has emerged, enabling large-scale adversary-in-the-middle (AiTM) attacks to steal Microsoft 365 credentials. This service allows attackers to bypass multifactor authentication (MFA) by…











