Taking the Ransom Out of Ransomware

Legislation has made the choice simple . . . An Article Review As the UK moves to prohibit government agencies from paying ransoms to hacker groups, organizations are questioning whether they can endure an attack. For a long time the question of what to do when facing a ransomware attack has included the question of […]

Upcoming FCC Vote May Change Cybersecurity Rules

A signal that some security requirements may be a thing of the past An Article Review A vote this week by the FCC, reported by Federal News Network, may rescind the broadband cybersecurity rules the agency adopted in January following the massive Salt Typhoon hacks. Those rules had used a reinterpretation of the Communications Assistance […]

Government Shutdown Puts Cybersecurity Threat Sharing At Risk

CISA Expiration Leaves Critical Data Sharing in Limbo An Article Review While the recent government shutdown has had many wide-reaching consequences so far, there have also been a number of seemingly less important victims that haven’t gotten as much media attention. One such victim is the 2015 Cybersecurity Information Sharing Act (CISA), which expired earlier this […]

When LLMs Go Beyond the Prompt

A Scary Proposition of a new LLM Risk… An Article Review A recent study from Carnegie Mellon University and Anthropic, reported by TechRadar, reveals that large language models (LLMs) are edging into a new phase. Given the right architecture, they can plan and execute cyberattacks with minimal human oversight. The researchers built a multi-agent system […]

The Rise of NFC Card Skimming

New PhantomCard malware has proven difficult for banks to detect… An Article Review For nearly as long as the technology has existed experts have been warning of the risks associated with contactless payment methods, such as the potential for an attacker to scan a victim’s cards merely by standing near them.  To prevent such attacks […]

“Protect Your Data” – Awareness Poster

Another awareness poster for YOUR customers (and users). Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Click on the version you want below to download it! Download Portrait Version Download Landscape Version You are welcome to print out […]

DNS Records Used to Hide Malware

Infrastructure is being weaponized An Article Review It’s long been known that DNS is a critical backbone of the internet. But what happens when attackers turn that infrastructure into a delivery system? That’s the question raised in a recent Ars Technica report detailing how threat actors are now hiding malware inside DNS TXT records, using […]

“Spot a Scam” – Awareness Poster

Another awareness poster for YOUR customers (and users). Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! This tip was provided by Mike Wade, Community Banker and Author of “The Anti-Hacker’s Handbook: Your Digital Survival Guide” Preorder it now! […]

Our Blog Policy

While we’re not a news service, we often use current events to comment on trends and our services. This blog is intended to get people thinking about topics and trends in Technology Risk Management, through our article reviews, as well as through original blog articles about current events and our MSSP services (such as our […]

Why Clear Cybersecurity Communication is Important

Strengthening Your Defenses by way of Education An Article Review In today’s digital-first banking landscape, robust cybersecurity is a given.  But is it enough to simply have strong defenses? A recent Accenture survey reveals that while banks may have made cybersecurity a priority, customers aren’t getting the message. The findings are stark: while a staggering 85% […]