Blog
Tech Blog
Log4j flaw: Attackers are making thousands of attempts to exploit this severe vulnerability
Cyber attackers are making over a hundred attempts to exploit a critical security vulnerability in Java logging library Apache Log4j every minute, security researchers have warned. The Log4j flaw (also now known as "Log4Shell") is a zero-day vulnerability...
Former Ubiquiti dev charged for trying to extort his employer
Nickolas Sharp, a former employee of networking device maker Ubiquiti, was arrested and charged today with data theft and attempting to extort his employer while posing as a whistleblower and an anonymous hacker. "As alleged, Nickolas Sharp exploited his access as a...
NIST 800-171: What it Is, and Why You Should Care
Since 2017, any federal contractor working in association with the Department of Defense (DoD) is required to comply with the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171 – Protecting Unclassified...
Compliance with Cybersecurity and Privacy Laws and Regulations
Most manufacturers are required to follow some Cybersecurity and Privacy standards, laws, regulations, or requirements. These may come from Federal, State, Local, or Tribal Governments, be industry-mandated, or voluntary. Here is a partial list of some of the more...
Satisfy both DFARS and ITAR Regulation Requirements with NIST 800-171
Data subject to ITAR or EAR (Export Administration Regulations) export control restrictions is referred to collectively as Controlled Information. NARA (National Archives and Records Administration) published 32 CFR Part 2002 Controlled Unclassified Information; Final...
Report: Amazon-Owned Twitch Suffers Massive Data Leak
The Amazon-owned streaming platform Twitch has reportedly suffered a massive data leak, which has disclosed confidential company information, as well as streamers’ earnings, with more than 100GB of data posted to the internet on Wednesday. The documents appear to...