Blog

The Internet Cannot be Defended from the PRC

Reading Time: 4 min.

The NSA release this week a comprehensive report with explicit details of the extent of the activity and ‘Tradecraft” of the APT 40 unit of the PRC. This is just confirmation of what we already know – and was addressed by both FBI Director Christopher Wray and NSA Chief General Timothy Haugh in testimony to congress this summer. But now…

Read more

KISS: Keep It Simple Security

Reading Time: 7 min.

Faction Networks changes the paradigm and enables K.I.S.S. by going back to the foundation of actually securing networking, and then building up from there a simple but comprehensive tool set to protect our connections, devices and data. Here is how.

Read more
Keep It Simple

The System is Blinking Red

Reading Time: 6 min.

The “Good Enough” strategy in Cyber Security is not going to cut it any more. The time frame here is anybody’s guess. 3 months? 3 years? But it is clear and obvious that massively disruptive cyber attacks await us unless we change our mindset and approach.

Read more
Linux XYZ Utils Back Door

5 Easy Cybersecurity Steps to Radically Reduce Your Risk NOW

Reading Time: 9 min.

For most small to mid-sized business owners, just keeping business and operations running is the primary concern. When one looks at all of the potential threats, and all of the steps that are required to implement a complete and rigorous cybersecurity defense, it can be very hard to know where to start. Here is a simple guideline for the 5…

Read more

Alert: Two major flaws expose WiFi networks to attack, affects billions of users

WiFi

Reading Time: 5 min.

Summary Two major flaws in open-source software could enable bad actors to break into password-protected home and enterprise WiFi networks. The…

Read more

How Could This Happen?! A Deep Dive into the Change Healthcare Attack

Reading Time: 11 min.

It’s not an aberration – it WILL happen again As many of you have no doubt heard or read about,…

Read more

Not Just ‘Factories’ – 40% of Food & Beverage Manufacturers Impacted by Ransomware Attack

Food Manufacturing

Reading Time: 1 min.

JSB Foods ransomware incident just a prominent example According to Claroty, more than 40% of food and beverage-sector respondents had…

Read more

Why a 2nd Class Air National Guardsman Could Read the Pentagon’s Briefings on Ukraine’s War Plan

Hacking data

Reading Time: 3 min.

Most people by now have heard of Jack Teixeira, or if not at least the infamous story of how a…

Read more

Uninterruptible Power Supply (UPS) Devices In the Bullseye for Hackers

Smart UPS Devices

Reading Time: 2 min.

Weak Protocols and Built-in Back Doors Make These Inviting Targets The Cybersecurity and Infrastructure Security Agency (CISA) and the Department…

Read more

Nobody Would Have Agreed to This

Reading Time: 9 min.

Even George Orwell Could Not Have Imagined the World We Live in Today Let’s Start with a Thought Experiment If…

Read more

Android TV Streaming Boxes Riddled with Backdoor Malware 

Reading Time: 1 min.

Well, this one certainly wins the prize this week! Wired Magazine published a round-up of multiple cybersecurity researchers and the…

Read more