Cyber Threat ADVISORY
Blog Amy Burks Blog Amy Burks

Cyber Threat ADVISORY

The Arkansas Cyber Defense Center (ACDC) advises all individuals and organizations to take immediate precautions following reports of cyberattacks targeting U.S. telecom networks by the State-Sponsored Advanced Persistent Threat (APT) group, Salt Typhoon. These attacks pose significant risks to personal privacy, business operations, and critical infrastructure.

Read More
Watch Out For These Seasonal Scams
Blog Amy Burks Blog Amy Burks

Watch Out For These Seasonal Scams

As the holiday season draws near, it's not just the time for joy and giving—it’s also peak season for scammers. Fraudsters take advantage of the festive hustle and bustle, creating schemes designed to exploit your holiday spirit and generosity. Protecting yourself from these schemes is essential to ensure your holiday remains merry and stress-free.

Read More
Charity Scams During the Holiday Season
Blog Amy Burks Blog Amy Burks

Charity Scams During the Holiday Season

As the holiday season nears, scammers ramp up their efforts with fake charity appeals and fraudulent offers. They exploit the festive spirit to steal money or personal information. Be cautious—verify charities and holiday deals before donating or purchasing, and protect yourself from falling victim to these common scams.

Read More
The Growing Threat of Deepfake Technology in Cyber Attacks
Blog Amy Burks Blog Amy Burks

The Growing Threat of Deepfake Technology in Cyber Attacks

In an era where technology advances rapidly, deepfake technology has emerged as both a fascinating innovation and a potential cybersecurity nightmare. Originally developed for entertainment purposes, deepfakes use artificial intelligence (AI) to create hyper-realistic videos and audio, making it possible to fabricate someone's likeness or voice with startling accuracy. While the initial use cases were harmless, deepfakes have now become a significant concern in cybersecurity, especially as they are increasingly being weaponized in phishing attacks, misinformation campaigns, and identity theft. In this blog, we’ll dive into how deepfake technology works, real-world examples of its malicious use, and how organizations can protect themselves from falling victim to deepfake-related attacks.

Read More
Integrity in the            Election Process
Blog Amy Burks Blog Amy Burks

Integrity in the Election Process

As the November elections draw closer, concerns about foreign adversaries trying to meddle in U.S. elections are ramping up again. Over the past few years, foreign entities have become more sophisticated in their attempts to create chaos, spread false information, and influence how people vote. While government agencies are hard at work protecting election systems, it's just as important for voters and local election officials to stay alert and aware of these threats.

Read More
Local cybersecurity expert warns of phishing scams during election season
Blog Amy Burks Blog Amy Burks

Local cybersecurity expert warns of phishing scams during election season

Tom Flak, Director of Cyber Programs at Forge Institute, says there's an uptick in phishing concerns during election seasons because people are already used to receiving campaign messages.

“While you normally should be suspicious when you get an email from someone you don’t know or don’t really communicate with, during the election season, you do kind of expect to get unsolicited emails from political campaigns," Flak says.

Read More
The Rising Threat of Ransomware and Data Breaches in Healthcare
Blog, acdc Amy Burks Blog, acdc Amy Burks

The Rising Threat of Ransomware and Data Breaches in Healthcare

Healthcare facilities are increasingly targeted by cybercriminals, with ransomware and data breaches posing severe risks to patient care and data integrity. In this post, we address the rising threat of ransomware and data breaches in the healthcare industry and how healthcare providers can prevent and mitigate these risks.

Read More
Software Updates - Why are they important?
Blog, acdc Amy Burks Blog, acdc Amy Burks

Software Updates - Why are they important?

Frequent reminders to update your phone are vital for protecting your data and optimizing device performance, as outdated systems are prime targets for cybercriminals. In addition to enhancing security, software updates often introduce new features and improve overall functionality. Staying current with updates not only helps prevent costly cyberattacks but also ensures a smoother and more efficient user experience.

Read More
Data Breach Letters- What do I do?
Blog, acdc Amy Burks Blog, acdc Amy Burks

Data Breach Letters- What do I do?

In today's digital era, data breaches have become alarmingly common, putting millions at risk of having their personal information exposed. Receiving a notification that your data has been compromised can be unsettling, but it's crucial to remain calm and take swift action. Start by understanding what information has been affected and follow the provided instructions.

Read More
Lessons from the Front Lines: Cyber Warfare Expert Jim Richberg to Share Insights at Forge Institute Cyber Summit
News, Blog Amy Burks News, Blog Amy Burks

Lessons from the Front Lines: Cyber Warfare Expert Jim Richberg to Share Insights at Forge Institute Cyber Summit

The 5th Annual Forge Institute Cyber Summit will be held on October 7-8, 2024, at the Statehouse Convention Center in Little Rock, Arkansas. This pivotal event will convene top cybersecurity experts and stakeholders to discuss the latest strategies and innovations in cyber defense.

Jim Richberg, Fortinet’s Head of Cyber Policy and Global Field Chief Information Security Officer (CISO), will deliver a keynote address.

Read More
Understanding AI in Social Engineering Attacks
Blog Amy Burks Blog Amy Burks

Understanding AI in Social Engineering Attacks

The Arkansas Cyber Defense Center (ACDC) is committed to advancing cybersecurity awareness and defenses across Arkansas. Our focus includes analyzing emerging threats, understanding the tactics employed by cybercriminals, and providing guidance to mitigate these threats. This blog is part of a series focused on the intersection of artificial intelligence and cybersecurity.

Read More