Latest from the News

A Conversation with Brandon Keath

Inside Business: Focus on Cyber Security

The Central Penn Business Journal interviewed Appalachia’s Cyber Security Practice Lead, Brandon Keath, to learn about cyber security issues and trends in Central PA.

Check out the full interview below:

Brandon Keath – Cyber Security Practice Lead

Read More

DHS, FBI Issue alert for SamSam

Following last week’s indictments and sanctions of two Iranians the U.S. government blames for ransomware attacks, DHS and the FBI on Monday issued a warning about the SamSam malware they allegedly distributed across the Internet.  We want to help your organization understand this threat and how to avoid it.

The SamSam suspects are believed to have targeted multiple industries, including …

Read More

Cisco Security Advisory

 

Vulnerability Summary

A vulnerability was discovered on certain Cisco Meraki devices that have our Local Status Page feature. This page is typically used for a few key configuration options needed to get devices connected to the cloud either on initial setup or after moving/changing configurations upstream. The vulnerability allows an attacker to inject configuration options and data into the …

Read More

Intel L1 Terminal Fault (L1TF) Chip Vulnerabilities

Intel has just disclosed three more vulnerabilities in its processors we need to make you aware of. These can be exploited by malware to potentially steal data from computer memory. This data can include passwords, encryption keys, and other confidential information. These flaws has been dubbed the ‘L1 Terminal Fault (L1TF) bug’, because they extract secret data from the CPU …

Read More

Spectre + Meltdown

What is this new vulnerability?

Computer researchers have recently found that most CPU chips have a hardware bug, that has actually been there for years.  This is a big deal because it affects almost every computer on your network, including all your workstations and servers, as well as SmartPhones, IoT devices, and even Cloud-based and virtual systems.

These new vulnerabilities …

Read More