Cyber Defense

Ransomware’s Dangerous New Trick Is Double-Encrypting Your Data

SAN FRANCISCO - Ransomware groups have always taken a more-is-more approach. If a victim pays a ransom and then goes back to business as usual—hit them again. Or don't just encrypt a target's systems; steal their data first, so you can threaten to leak it if they don't pay up. The latest escalation? Ransomware hackers who encrypt a victim's

By |2021-05-23T18:33:10-04:00May 23rd, 2021|Cyber Defense|

ISSA Motor City Chapter Meeting

Meeting Information Join us at the MotorCity ISSA for a discussion on Information Security. Date: May 20, Time: 6:00PM to 8:00PM Location: Register to receive the meeting invite. Speaker and Topic Information The guest speaker will be announced soon. Career Corner - Coming to a Motor City ISSA meeting near you. Are you or someone

By |2021-05-17T19:57:07-04:00May 16th, 2021|Cyber Defense|

Russian-Based Ransomware Attack Shuts Down East Coast Fuel Pipeline

ANN ARBOR - Former Michigan Chief Information Security officer Dan Lohrmann, now a vice president with Security Mentor, dishes on the ransomware attack against the Colonial Pipeline that carries most of the gas and other fuel used along the US East Coast. It's clear a Russian-based group's ransomware was used, but by who? Fingers points

By |2021-05-11T07:54:36-04:00May 10th, 2021|Cyber Defense, mitechtv|

Nation’s Power Grid Ripe for Ransomware, Other Cyberattacks

WASHINGTON DC - Last week, the Biden administration launched a 100-day plan to strengthen the cybersecurity of the nation’s power grid. The administration wants to increase the cybersecurity of electric utilities’ industrial control systems and secure the sector’s supply chain. At the same time, the U.S. Department of Energy issued a request for information to

By |2021-05-09T18:17:19-04:00May 9th, 2021|Cyber Defense|

Women in Defense Michigan Chapter Hosting Operation Warp Speed Director Whicker

DETROIT - WID-MI's monthly virtual program in May will feature Marion G. Whicker is the Chief of Supply, Production and Distribution for Operation Warp Speed - to develop, manufacture and distribute COVID-19 vaccines to 300 million Americans on an accelerated timeline. In her Operation Warp Speed role, Whicker oversees and coordinates efforts to expand and

By |2021-04-26T17:38:29-04:00April 26th, 2021|Cyber Defense|

Richard Stiennon With Russian Hacking Update

ANN ARBOR - Earlier this month, President Biden levied sanctions on a number of Russian technology companies he says hacked the US in an attempt to sway the 2020 election to former president Trump. Biden also said US intelligence confirmed that Russians also hacked Solarwinds and penetrated thousands of organizations globally including multiple parts of

By |2021-04-23T11:11:07-04:00April 23rd, 2021|Cyber Defense, mitechtv|

MI Cyber Patriot Awards, Summer Camps Update

ANN ARBOR - Michigan Cyber Patriot program teaches middle and high school students not only how to protect themselves online from cyber predators, but also provides a grounding for them to the high demand job world of cyber warriors. In this video, Michigan State Director Tamara Shoemaker names the recent award winners for Cyber Patriot

By |2021-04-15T11:01:38-04:00April 15th, 2021|Cyber Defense, mitechtv|

Latest Cyber Hack Of Security Camera Provider Verkada

ANN ARBOR - Cybersecurity expert Richard Stiennon joins Matt and Mike to talk about the latest cyber hacks, including Verkada, a Silicon Valley security startup that provides cloud-based security camera services. The company suffered a major security breach. Hackers gained access to over 150,000 of the company’s cameras, including cameras in Tesla factories and warehouses,

By |2021-03-26T14:43:37-04:00March 26th, 2021|Cyber Defense, mitechtv|

Lightspin Reveals AWS Identity And Access Management Vulnerable To Abuse

TEL AVIV, Israel  - Lightspin announced the results of its research, which discovered a gap between AWS Identity and Access Management user and group policies that an attacker can abuse to take over accounts, delete group members, steal data and shut down services. The research team was able to compromise dozens of accounts by using this

By |2021-03-25T21:19:12-04:00March 25th, 2021|Cyber Defense|