BankInfoSecurity.com reported the new US law “will require critical infrastructure owners and operators to report to the Cybersecurity and Infrastructure Security Agency if they experience a substantial cyberattack (report due within 72 hours of the attack) or if they make a ransomware payment (report dues within 24 hours of the

Continue Reading What took Congress so long to pass a Cyber Incident Reporting Mandate?

BankInfosecurity.com reported about a FBI flash alert, “As of January, the FBI has identified at least 52 entities across 10 critical infrastructure sectors affected by RagnarLocker ransomware, including entities in the critical manufacturing, energy, financial services, government, and information technology sectors…”  The March 8 2022 report entitled “Ransomware Groups

Continue Reading Ransomware is a major threat to public utilities!


Decrypt.co reported that “The U.S. Securities and Exchange Commission, which has taken a tough line toward cryptocurrency projects under Chairman Gary Gensler, is probing NFT creators and marketplaces for regulatory violations, according to a Bloomberg Report that cites anonymous sources familiar with the investigation.”  The March 2, 2022 article

Continue Reading SEC Targeting NFT Creators!


Darkreading.com reported that “Security experts expect that some of the attacks will be targeted and executed by state-backed Russian threats.” The February 25, 2022 article entitled “7 Steps to Take Right Now to Prepare for Cyberattacks by Russia” included these comments about Step #5 Communicate:

There’s only so

Continue Reading Are You Really Ready for the Next Cyberattack?


Darkreading.com reported that a “new study shows that in 2021 more organizations experienced at least one successful email-based phishing attack than the year before. There were also more opportunistic and targeted phishing attacks last year compared with 2020, as well as phishing attacks involving ransomware and business email compromise (BEC).”  The

Continue Reading No surprise that phishing & spearphishing (BEC) attacks are increasing!


BankInfoSecurity.com reported that “The U.S.-China Economic and Security Review Commission on Thursday held a daylong hearing on cybersecurity threats posed by Xi Jinping-led China, including the nation’s expansive cyberespionage and disinformation capabilities, along with its technical prowess in cyberwarfare.”  The February 17, 2022 report entitled “Experts Outline Chinese Cyberwarfare

Continue Reading Beware of Chinese Cyberwarfare!


Bloomberg.com reported that “The U.S. Treasury Department indicated that it plans to spare crypto miners and stakers from rules that would require digital-asset brokers to turn over information on their clients’ transactions to the IRS.”  The February 11, 2022 report entitled “Treasury Signals Crypto Miners Won’t Face IRS

Continue Reading Crypto Miners and Stakers Won’t Have to Turn Over Data to IRS!


CoinTelegraph.com reported that in Russian “Cryptocurrency transactions of more than 600,000 rubles (roughly $8,000) will have to be declared; otherwise, it could be considered a criminal act.” The February 9, 2022 article entitled “Russian government and central bank agree to treat Bitcoin as currency” included these comments:

Russia’s

Continue Reading Russia Treats Bitcoin as Currency!


TheBlockCrypto.com reported that “The US-based sportswear giant Nike is suing StockX, an online resale marketplace selling shoes, streetwear and other goods, for trademark infringement, trademark dilution and other charges.”  The February 7, 2022 article entitled “Nike sues StockX for trademark infringement in latest NFT mint” included these comments

Continue Reading Can Nike Prove a Trademark Infringement of an NFT?


Darkreading.com reported that “Everyone agrees cybersecurity is an urgent issue, but uncertainty still reins in how companies tackle it. The typical IT team is struggling under the weight of a variety of increasingly sophisticated intrusions, from social engineering attacks that fool users into compromising systems and confidential information to exploitation

Continue Reading 5 Things to Do to Defend From Hackers