This week's episode covers defense contracts and ransomware, common cloud misconfiguration exploits, theft of IP, and Android eavesdropping bugs.

 

 


Defense Contractors are Highly Susceptible to Ransomware Attacks

Help Net Security

Attack Type:

CS Standards and Regs v2   Threat actors v2

 

What To Know:  Defense contractors are still highly susceptible to ransomware attacks, despite efforts by the Pentagon to help secure our supply chain via the CMMC.

Why You Should Care:  The toil and treasure of U.S. taxpayers is being ripped off by our strategic competitors.  What is worse, this could put our warfighters at risk of getting killed.


Common Cloud Misconfigurations can be Exploited in Minutes

Cyware

Attack Type: 

Malicious Logic v2   Threat actors v2            

 

What To Know:  A new report shows that common cloud misconfigurations can be exploited in minutes.

Why You Should Care:  Cloud computing is attractive for many reasons, but do not make the mistake of assuming that security is the CSP (Cloud Service Providers) problem only.  Improper use of the cloud can lead to data exfiltration.


NCSC Warns Industry, Academia of Foreign Threats to Their Intellectual Property

CSO Online

Attack Type: 

Threat actors v2

 

What To Know:  The NCSC (National Counterintelligence and Security Center) has warned that American industry and academia are being targeted for intellectual property theft.

Why You Should Care:  American universities remain a destination for the entire world, especially for those seeking advanced STEM degrees.  Keeping these organizations secure is important if we wish to remain competitive.


Multiple Bugs Enable Eavesdropping on 37% of Android Phones

Infosecurity Magazine

Attack Type: 

 Malicious Logic v2   Threat actors v2

 

What To Know:  Multiple bugs enable eavesdropping on 37% of Android phones.

Why You Should Care:  Don’t assume that your smartphone is “secure.”  It isn’t.

 

News & Updates

APPALACHIA IN THE NEWS: Appalachia Technologies Cited in Case Study to Improve Efficiencies and Service Delivery   Improve and Evolve - this is one of the five Core Values of Appalachia Technologies and one we believe helps us to stay at the forefront of our industry.  Our Technical Assistance Center (TAC), while performing well and delivering quality service, was being challenged by processes for documentation that were manual and outdated.  Not satisfied with the current way of doing this, Chris Swecker, Manager of TAC, began to explore IT Glue.  IT Glue centralizes information, allowing for efficiencies in response time, accuracy, and client satisfaction.  As he explains, "IT Glue became our source of truth."  Chris and his team built on the success by incorporating additional tools to assist with password rotation and a client-side tool for password management and shared documentation.  

Contact Us

Learn more about what Appalachia Technologies can do for your business.

Appalachia Technologies
5000 Ritter Road Suite 104
Mechanicsburg, Pennsylvania 17055

Appalachia Technologies
  • About Us
  • IT Services
  • Compliance
  • Resources
  • Contact Us
  • Who We Serve
  • Speaker Request
  • (888) 277-8320