When Ransomware Decryptors Don’t Work

By Lance James The last few weeks, I’ve been spending my days helping victims recover from ransomware attacks. When doing this, restoration is the number one priority, and the motto becomes “as fast as you can“. There have been some challenges along the way, and some “shocking” reveals when working with criminal software when expecting […]

Read More When Ransomware Decryptors Don’t Work

WFH Security Advisory

Cats on Keyboards – 221B-01 Unit 221B is a remote business, and working from home is commonplace. Of course, a WFH environment changes the security paradigm, and one has to be vigilant against cats walking all over the keyboard while at work. The following are common use cases where this security advisory would apply: user […]

Read More WFH Security Advisory

AI Biometric Spoofing

By Mark Rasch For more than 40 years, information security professionals have argued for stronger authentication (and access control) protocols.  For most, this has meant some form of multi-factor authentication (MFA). Some combination of something you ARE (biometric), something you HAVE (token or device) and something you KNOW (password, passphrase, PIN).  Certainly, a combination of […]

Read More AI Biometric Spoofing

BEC and Call

BUSINESS E-MAIL COMPROMISE LEADS TO LIABILITY By Mark D. Rasch – Chief Legal Officer @ Unit 221B When William Darby went to work as a securities broker in October of 2018, little did he know that he was going to not only have a bad day, but ultimately a bad career. Darby’s firm fell victim […]

Read More BEC and Call