Featured

Three Arrests Made In Massive Twitter Scheme Hack: Investigative Insights

Mark Rasch Early in the morning of July 31, 2020, Hillsborough County, Florida law enforcement officials arrested 17 year old Graham Clark as being at least one of the participants in the massive scheme to “hack” the identities of certain celebrity users of the Twitter social media platform.  The arrest, and leveling of 30 felony […]

Read More Three Arrests Made In Massive Twitter Scheme Hack: Investigative Insights
Featured

How the Coronavirus Enabled the Twitter Hack (*and others too)

The recent hack of Twitter demonstrates how the hacking community targets high-profile users on high-profile networks not only for fraud, but also for attacks on their privacy and attacks aimed at “piggybacking” off their identity and celebrity. While the identity of the hackers is still under active investigation, there are a few things we know (and more that we suspect) about how and why the hack occurred. And part of the problem is COVID-19…

Read More How the Coronavirus Enabled the Twitter Hack (*and others too)
Featured

When Ransomware Decryptors Don’t Work

By Lance James The last few weeks, I’ve been spending my days helping victims recover from ransomware attacks. When doing this, restoration is the number one priority, and the motto becomes “as fast as you can“. There have been some challenges along the way, and some “shocking” reveals when working with criminal software when expecting […]

Read More When Ransomware Decryptors Don’t Work
Featured

WFH Security Advisory

Cats on Keyboards – 221B-01 Unit 221B is a remote business, and working from home is commonplace. Of course, a WFH environment changes the security paradigm, and one has to be vigilant against cats walking all over the keyboard while at work. The following are common use cases where this security advisory would apply: user […]

Read More WFH Security Advisory

AI Biometric Spoofing

By Mark Rasch For more than 40 years, information security professionals have argued for stronger authentication (and access control) protocols.  For most, this has meant some form of multi-factor authentication (MFA). Some combination of something you ARE (biometric), something you HAVE (token or device) and something you KNOW (password, passphrase, PIN).  Certainly, a combination of […]

Read More AI Biometric Spoofing

BEC and Call

BUSINESS E-MAIL COMPROMISE LEADS TO LIABILITY By Mark D. Rasch – Chief Legal Officer @ Unit 221B When William Darby went to work as a securities broker in October of 2018, little did he know that he was going to not only have a bad day, but ultimately a bad career. Darby’s firm fell victim […]

Read More BEC and Call