Phishers reach targets via Eventbrite services The phishing emails look like they are coming from Eventbrite because they are, but their content is crafted to impersonate legitimate businesses such as NLB Group (financial institution), EnergyAustralia (energy company), DHL (delivery service), Qatar Post (post service), and others. https://lnkd.in/dGW4PMms
MaxISS, LLC
Computer and Network Security
Kelso, Tennessee 29 followers
Information Systems Security Consulting & Contract Services
About us
MaxISS, LLC is a cybersecurity consulting firm that specializes in serving K-12 schools and higher education institutions. Owned and operated by Richard H. Maxwell, the company is strategically located in Lincoln County, Tennessee, and offers a wide range of services including vCISO consulting, cybersecurity architecture, security assessments, risk assessments, and network infrastructure design. The company aims to provide top-notch cybersecurity solutions that will help educational institutions protect their sensitive information and ensure the safety of their students, staff, and faculty.
- Industry
- Computer and Network Security
- Company size
- 1 employee
- Headquarters
- Kelso, Tennessee
- Type
- Self-Employed
- Founded
- 2023
- Specialties
- Cybersecurity, Information Assurance, Network Infrastructure Design, and Security Assessments
Locations
-
Primary
Kelso, Tennessee 37348, US
Employees at MaxISS, LLC
Updates
-
Video Privacy Protection Act Ruling May Signal Safer Online Browsing The Second Circuit has just revived a dismissed class action suit against the National Basketball Association (NBA) for violations of the Video Privacy Protection Act (VPPA). The plaintiff claimed that the NBA unlawfully disclosed his personal viewing information without consent. https://lnkd.in/dm9c2sbc
-
U.S. Government Issues New TLP Guidance for Cross-Sector Threat Intelligence Sharing "We adhere to these markings because trust in data handling is a key component of collaboration with our partners." In using these designations, the idea is to foster trust and collaboration in the cybersecurity community while ensuring that the information is shared in a controlled manner, the government added. https://lnkd.in/gqpcEPE7
U.S. Government Issues New TLP Guidance for Cross-Sector Threat Intelligence Sharing
thehackernews.com
-
Poor vulnerability management could indicate larger cyber governance issues, S&P says Companies that fail to identify and remediate vulnerabilities could be held accountable when they are assessed for their overall level of risk management and internal controls, according to S&P. https://lnkd.in/gim2G6jr
Poor vulnerability management could indicate larger cyber governance issues, S&P says
cybersecuritydive.com
-
Cybersecurity Matured: DoD Finalizes Cybersecurity Maturity Model Certification (CMMC) Program Importantly, publication of the Final Program Rule does not immediately implement the DoD’s CMMC contract requirements. Instead, the trigger for CMMC’s implementation for contractors is tied to a separate CMMC rule (the “CMMC Clause Rule”), which is currently in a proposed rule and will likely not be finalized until sometime in 2025. https://lnkd.in/eGFmGexF
-
Navigating cyber insurance coverage as threats evolve "Whereas you look at cyber insurance, you are insuring a risk that is actively trying to circumvent the controls that the risk adjusters are using in order to determine your premium rates and your risk level. And so as soon as that underwriting is complete, it's basically out of date already." https://lnkd.in/eWzCYv2s
Navigating cyber insurance coverage as threats evolve | TechTarget
techtarget.com
-
Trump campaign arms up with 'unhackable' phones after Iranian intrusion However, this is like a red rag to a bull for some criminally minded coders, as well as white-hat hackers. Logically, no software is impervious to dedicated attacks, but Green Hills thinks otherwise, and also wants to extend the use of the code to election systems themselves. https://lnkd.in/gZ5uYqY5
Trump campaign gets 'unhackable' phones
theregister.com
-
Thousands of Fortinet instances vulnerable to actively exploited flaw The most recent count taken from Sunday put the number of IPs vulnerable to the bug at 86,602 – a slight decrease from 87,930 the day before. [...] CVE-2024-23113 was first disclosed in February, but the bad guys had been too busy experimenting with other critical bugs that were fixed around the same time. https://lnkd.in/gQkfNj68
-
CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance "A malicious cyber actor could leverage the information gathered from unencrypted persistence cookies to infer or identify additional network resources and potentially exploit vulnerabilities found in other devices present on the network," CISA said in an advisory. https://lnkd.in/gHfQhJP8
CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance
thehackernews.com
-
Are College Students Under Surveillance? For instance, learning management systems, attendance tracking systems, and software to monitor remote exams are used daily. In Smart University, Weinberg shares how vast amounts of student data, including location, browsing habits, and behavioral patterns, are shared with higher education institutions. https://lnkd.in/gSTqVjKF
Are College Students Under Surveillance?
social-www.forbes.com