Blog - TSP

Inheritance scams have targeted 15% of adults

Payment and financial scams were examined in a recent Visa report. The report revealed that while the number of individual scam reports from June to December 2023 decreased, the total money lost increased, indicating that scammers are using more effective and costly schemes to target victims. The report highlighted top consumer scams: “Pig butchering” scams: […]

DHS Suggests New Reporting Regulations for Critical Infrastructure

The Department of Homeland Security (DHS) has introduced a proposed set of regulations for reporting on critical infrastructure incidents. These rules will outline the requirements for critical infrastructure organizations to report cyberattacks or other cyber incidents to the federal government. The Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) mandates that the reporting process be […]

New study shows a reemerged botnet attacking outdated devices

Recent research conducted by the Black Lotus Labs team at Lumen Technologies has uncovered ongoing efforts to target end-of-life (EoL) and IoT devices. A key focus of this campaign is on small home and small office routers, with the use of an updated version of malware known as TheMoon. John Bambenek, President at Bambenek Consulting, […]

Protecting PII and other important data: Strategies for security leaders

Security leaders must be cautious when safeguarding personally identifiable information (PII) due to the constantly evolving restrictions and guidelines. Data is ubiquitous in today’s society, ranging from company-wide information to an individual employee’s password. Shiva Nathan, the Founder and CEO of Onymos, offers insights on the recent government requirements for PII protection and how security […]

Government agencies join forces to develop a comprehensive guide for combating DDoS attacks

The CISA, FBI and Multi-State Information Sharing and Analysis Center (MS-ISAC) collaborated to create a document guideline for organizations to defend against DDoS attacks. As DDoS attacks can be a challenge to trace and block, the vector is often leveraged by hacktivists, nation-state groups and other politically motivated actors. Therefore, government websites are common targets.  The […]

FTC Rejects Request for New COPPA Application

The Federal Trade Commission (FTC) has declined an application “without prejudice” by the Entertainment Software Rating Board, Yoti, and SuperAwesome for FTC approval of a new method for obtaining parental consent under the Children’s Online Privacy Protection Rule (COPPA Rule). The applicants in 2023 sought approval for the use of “Privacy-Protective Facial Age Estimation” technology, […]

Global Influence Changing in a Year of Elections – The Shift in Power

The influence of individual countries has evolved drastically due to the rapid advancements in digital technologies. Geographical constraints are no longer the sole determinants of power. In this episode, experts discuss how modern forces are reshaping global spheres of influence and impacting elections in major powers around the world. Chinese and Russian pragmatism is challenging […]

Florida Pediatric Associates experiences health data breach

Florida Pediatric Associates (FPA) has disclosed that a data breach at Bowden Barlow Law may have impacted FPA health information. Fortunately, FPA’s systems were not affected as the breach was contained within Bowden Barlow’s environment. On December 27, 2023, Bowden Barlow notified FPA of a potential data security incident, indicating that certain patient data from […]

Leveraging One-Day Vulnerabilities: The Magnet Goblin Group

Recent research has shown that Magnet Goblin, a financially motivated threat actor group, exploits one-day vulnerabilities as a preliminary infection vector. The group predominantly targets public-facing servers and deploys Nerbian malware, such as NerbianRAT and MiniNerbian. Previous activities carried out by the threat actor group were detailed by security vendors, although at that point, none […]

Secure Software Development Attestation Form released by CISA

The CISA has released a form that outlines the basic requirements for secure software development for organizations that create software for the government. The attestation specifies additional security measures that software providers must adhere to during the development process. This is crucial to ensure that the software used by the government is developed in a […]

Subscribe Our Newsletter

We hate spam, we obviously will not spam you!

Services
Use Cases
Opportunities
Resources
Support
Get in Touch
Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC