Tag Archive for: form

CERBERUS CYBER SENTINEL CORP MANAGEMENT’S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS (form 10-Q)


The following Management’s Discussion and Analysis of Financial Condition and
Results of Operations should be read in conjunction with our condensed financial
statements and related notes.

Unless otherwise indicated or the context requires otherwise, the terms “we,”
“us,” “our,” and “our company” refer to Cerberus Cyber Sentinel Corporation, a
Delaware corporation (“Cerberus”), and its wholly owned subsidiaries, including
GenResults, LLC, an Arizona limited liability company (“GenResults”), TalaTek,
LLC
, a Virginia limited liability company (“TalaTek”), Technologyville, Inc., an
Illinois corporation (“Techville”), Clear Skies Security, LLC, a Georgia limited
liability company (“Clear Skies”), Alpine Security, LLC, an Illinois limited
liability company (“Alpine”), Catapult Acquisition Corporation, a New Jersey
corporation (“VelocIT”), Southford Equities, Inc., a British Virgin Islands
company (“Arkavia”), True Digital Security, Inc., a Delaware corporation (“True
Digital”), RED74 LLC, a New Jersey limited liability company (“RED74”), Atlantic
Technology Systems, Inc.
, a New Jersey corporation (“ATS”), and Atlantic
Technology Enterprises, Inc.
, a New Jersey corporation (“ATE” and together with
ATS, “Atlantic”). Unless otherwise specified, all dollar amounts are expressed
in United States dollars.



Our Business


We are a cybersecurity and compliance company comprised of highly trained and
seasoned security professionals who work with clients to enhance or create a
better cyber posture in their organization. Cybersecurity, also known as
computer security or information technology security, is the protection of
computer systems and networks from information disclosure, theft of or damage to
their hardware, software, or electronic data, as well as from the disruption or
misdirection of the services they provide. The cybersecurity industry has a
supply and demand issue wherein there is more demand for cybersecurity services
than there are expert and seasoned compliance and cybersecurity professionals
available in the market. We seek to identify, attract, and retain highly skilled
cyber and compliance teams and bring them together to provide holistic cyber
services. We accomplish…

Source…

Police, Cyber Security Agency warn of ransomware in form of Windows OS update


SINGAPORE – The police and the Cyber Security Agency of Singapore (CSA) have jointly warned of a ransomware variant that masquerades as a Windows operating system update.

The fake update locks up victims’ data and then demands a ransom from those who inadvertently download it.

Called Magniber, it gives attackers access to victims’ personal data, such as details of their bank accounts and social media accounts, which the attackers can then use to steal money or impersonate the victims.

Downloading it through a fake Windows OS update link, a pop-up ad or an e-mail file from an unknown sender leads to a ransom note being displayed.

The attackers demand payment in the form of cryptocurrencies such as Bitcoin if victims want to regain access to their data.

Attackers might also gain access to photos and videos stored in the victims’ devices, which can in turn be leveraged to scam or extort money from victims.

In more egregious cases, attackers would even be able to gain remote control of their victims’ devices.

The police and CSA said members of the public should be wary of the ransomware, and make sure their mobile phones, computers and other devices are updated regularly with the latest OS versions from official and verified sources.

People should install antivirus applications that can detect and remove malware, and back up their data regularly in a separate, offline system that remains accessible even during a ransomware attack.

They should also avoid clicking on pop-up ads or opening files from unknown senders.

The police and CSA said they do not recommend paying the ransom as it does not guarantee that the data would be decrypted as promised and would also encourage attackers to continue their criminal activities.

Victims should lodge a police report immediately and can visit this website to check if there are readily available decryptors as a possible solution.

The Magniber ransomware variant first started on Internet Explorer, before spreading through other Internet browsers such as Microsoft Edge and Chrome late last year and this year.

Source…

Samsung unveils 512GB DRAM CXL module in E3.S form factor • The Register


Samsung has unveiled a 512-gigabyte Compute Express Link (CXL) DRAM module, which awaits servers to make it sing.

The device will ship in the EDSFF E3.S form factor – a standard most often employed in high-capacity solid-state disks (SSDs).

E3.S is expected to replace both M2 and 2.5-inch SSDs eventually, but Samsung has acknowledged that it may be some time before servers ready to handle the device appear. That time may well be spent figuring out how to make DRAM work well in E3.S, as DRAM is faster than the flash used in SSDs. The good news is PCIe 5.0 can handle that extra I/O action.

For now, the Korean giant is pleased that Lenovo has signed up to work on CXL devices.

The Chinese builder will likely get its hands on the 512GB CXL DRAM modules in Q3, when Samsung says “joint evaluation and testing” will commence, before “commercialization as next-generation server platforms become available.”

CXL matters because it enables the creation of switched fabrics that allow a host server to connect to resources on multiple other devices. Servers packing some of Samsung’s new 512GB monsters could therefore be accessed by other servers – the sort of thing VMware has started to build with its Project Capitola software-defined memory.

Samsung has its own software on the way to put the modules to work. The chaebol has an updated version of its open source Scalable Memory Development Kit in the pipeline and suggests it will take advantage of the new module and CXL.

Large memory modules are attractive because applications like AI, ML, ERP, and clouds all benefit from higher compute density and more opportunities to store data in-memory.

Samsung has previously teased 512GB DDR5 DIMMS, so it’s the implementation of CXL and form factor that makes this announcement most significant. ®

Source…

Security organisations form Nonprofit Cyber coalition


A group of implementation-focused cyber nonprofits – including the likes of the Center for Internet Security, Crest International, and the Fido Alliance – have joined forces to create an umbrella coalition that will work to develop, share, deploy and increase awareness of security best practice, tools, standards and services.

Formed in the US, but globally relevant, the Nonprofit Cyber coalition is envisioned as a “collaboration of equals” and will initially focus on two priorities – building awareness of cyber nonprofits, and aligning the work of its 22 founding members, all of which must hold nonprofit status under US law or their home country equivalents.

The founding members are: the Anti-Phishing Working Group, the Center for Internet Security, the Center for Threat-Informed Defense, the Cloud Security Alliance, Consumer Reports, Crest International, the Cyber Defence Alliance, the CyberPeace Institute, the Cyber Readiness Institute, the Cyber Threat Alliance, the Cybercrime Support Network, the CyberGreen Institute, the Fido Alliance, the Forum of Incident Response and Security Teams, the Global Cyber Alliance, the National Cyber Forensics and Training Alliance, the National Cybersecurity Alliance, the Open Web Application Security Project, SAFECode, the Shadowserver Foundation, #ShareTheMicInCyber, and Sightline Security.

The group is also welcoming applications for new members, focusing only on those that work to implement security best practice and solutions at scale, and not lobbying, policy development or advocacy groups, nor industry bodies.

Philip Reitinger, CEO of the Global Cyber Alliance (GCA) and newly elected co-chair of the coalition, said: “A large number of nonprofits that focus on cyber security implementation are working within their own areas of action toward the joint goal of improving cyber security, but the lack of coordination and communication among them can lead to inefficiency and duplication of effort.

“Better communication and collaboration among these groups will enable programmatic and opportunistic action to improve cyber security.”

Tony Sager, Center for Internet Security vice-president and chief evangelist, and the…

Source…