Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Nice EOD scoop playing out. New base forming at .0175 We are golden..
Entry point .016-.0169 Plain and simple. Next run will start from here.
Time to start buying! this will be over .10 in a few weeks.
Only get to keep what you can sell.. Don't get greedy enjoy your profits.
Congrats to all!!
How is that even possible??
Just chatting with admin and they are telling me that even they cannot remove the spam... Not impressed..
It got real quite in here didn't it.
Can the vol mods remove them?
Yes Yes Yes HCEI Will be a huge runner some day. Glad I have my tickets!
Agreed!! You can tell it was going to get walked down when the ask got fat.
I'm not saying don't buy I'm saying let it cool off a bit and get a better deal. Congrats on the people taking some profits today!!
Dump is on time to buy more on the low low..
Setting news highs. Looking strong into the weekend!
I'm still here I know its been slow but I was looking over the site this morning and it looks like they have updated and refreshed a few things. Still holding quite a bit for the next run.
Picked up 2k more 4's today..
JFIL looking strong..
OCSY buying all dips
HCEI Still holding strong
GLTA
JFIL looking strong..
OCSY buying all dips
HCEI Still holding strong
GLTA
JFIL looking strong..
OCSY buying all dips
HCEI Still holding strong
GLTA
Still waiting on that HUGE News...... WTF
I fig I would take a small starter here. Have a great weekend
THE WOODLANDS, TEXAS, May 22, 2018 (GLOBE NEWSWIRE) -- Optium Cyber Systems, Inc. (“Optium” or the “Company”) (OTC:OCSYD), a developer of a proprietary process that analyzes and identifies cyber security vulnerabilities in critical corporate IT infrastructures, would like to review with stockholders the accomplishments of the first quarter of 2018.
The following key goals were met or maintained during the period January 1, 2018 to March 31, 2018:
-- continued the development and deployment of the Optium platform for the medical sector. This is included ongoing relationship and strategic alliances development within the sector. The Company is actively looking for a joint venture partner such as medical device supplier to expedite the rollout;
-- continued the development of the platform for the cryptocurrency sector;
-- commenced the development of the platform for the mortgage industry;
-- continued the development of strategic alliances in new sectors with the intention of entering into license agreements to expedite entry into other markets;
-- strengthened management team with the addition of Brigadier General (Retired) Mark Beesly (Defense) and Michael Russell (Oil & Gas) to its Board of Advisors.
In addition to the above, Optium:
-- secured three revenue contracts worth over $800,000 per annum;
-- was featured on Fox Business News ‘New To The Street’;
-- was featured on Uptick News Wire ‘Stock Day’ Podcast;
-- was approached to prepare a White Paper on cyber security for the Oil & Gas Industry for the American Petroleum Institute.
“As I have previously stated, it is important for an organization to have a clear and decisive game plan in order to be successful. Without a clearly defined set of objectives there is no definitive way of measuring success,” stated George Rutherford, President of Optium Cyber Systems, Inc. “Our objectives for the first quarter have all been met and we are very excited about new opportunities that have developed since, including an application in the blockchain sector.
“With everything that the company has on the table, management are very confident that our growth will continue to not only meet but exceed expectations,” continued Mr. Rutherford.
About Optium Cyber Systems, Inc.
Optium Cyber Systems, Inc. has developed a proprietary process to analyze, identify and address cyber security vulnerabilities in an organization’s critical IT infrastructure which is scalable to any size organization in any industry. The Company has recently launched in the health care sector, focusing on protecting health care facilities including hospitals, nursing homes and doctor’s offices from cyberthreats such as the manipulation of medical devices or theft of patient records. Optium Cyber Systems, Inc. is publicly traded having its common shares quoted on the OTC Markets under the symbol "OCSYD".
THE WOODLANDS, TEXAS, May 22, 2018 (GLOBE NEWSWIRE) -- Optium Cyber Systems, Inc. (“Optium” or the “Company”) (OTC:OCSYD), a developer of a proprietary process that analyzes and identifies cyber security vulnerabilities in critical corporate IT infrastructures, would like to review with stockholders the accomplishments of the first quarter of 2018.
The following key goals were met or maintained during the period January 1, 2018 to March 31, 2018:
-- continued the development and deployment of the Optium platform for the medical sector. This is included ongoing relationship and strategic alliances development within the sector. The Company is actively looking for a joint venture partner such as medical device supplier to expedite the rollout;
-- continued the development of the platform for the cryptocurrency sector;
-- commenced the development of the platform for the mortgage industry;
-- continued the development of strategic alliances in new sectors with the intention of entering into license agreements to expedite entry into other markets;
-- strengthened management team with the addition of Brigadier General (Retired) Mark Beesly (Defense) and Michael Russell (Oil & Gas) to its Board of Advisors.
In addition to the above, Optium:
-- secured three revenue contracts worth over $800,000 per annum;
-- was featured on Fox Business News ‘New To The Street’;
-- was featured on Uptick News Wire ‘Stock Day’ Podcast;
-- was approached to prepare a White Paper on cyber security for the Oil & Gas Industry for the American Petroleum Institute.
“As I have previously stated, it is important for an organization to have a clear and decisive game plan in order to be successful. Without a clearly defined set of objectives there is no definitive way of measuring success,” stated George Rutherford, President of Optium Cyber Systems, Inc. “Our objectives for the first quarter have all been met and we are very excited about new opportunities that have developed since, including an application in the blockchain sector.
“With everything that the company has on the table, management are very confident that our growth will continue to not only meet but exceed expectations,” continued Mr. Rutherford.
About Optium Cyber Systems, Inc.
Optium Cyber Systems, Inc. has developed a proprietary process to analyze, identify and address cyber security vulnerabilities in an organization’s critical IT infrastructure which is scalable to any size organization in any industry. The Company has recently launched in the health care sector, focusing on protecting health care facilities including hospitals, nursing homes and doctor’s offices from cyberthreats such as the manipulation of medical devices or theft of patient records. Optium Cyber Systems, Inc. is publicly traded having its common shares quoted on the OTC Markets under the symbol "OCSYD".
THE WOODLANDS, TEXAS, May 22, 2018 (GLOBE NEWSWIRE) -- Optium Cyber Systems, Inc. (“Optium” or the “Company”) (OTC:OCSYD), a developer of a proprietary process that analyzes and identifies cyber security vulnerabilities in critical corporate IT infrastructures, would like to review with stockholders the accomplishments of the first quarter of 2018.
The following key goals were met or maintained during the period January 1, 2018 to March 31, 2018:
-- continued the development and deployment of the Optium platform for the medical sector. This is included ongoing relationship and strategic alliances development within the sector. The Company is actively looking for a joint venture partner such as medical device supplier to expedite the rollout;
-- continued the development of the platform for the cryptocurrency sector;
-- commenced the development of the platform for the mortgage industry;
-- continued the development of strategic alliances in new sectors with the intention of entering into license agreements to expedite entry into other markets;
-- strengthened management team with the addition of Brigadier General (Retired) Mark Beesly (Defense) and Michael Russell (Oil & Gas) to its Board of Advisors.
In addition to the above, Optium:
-- secured three revenue contracts worth over $800,000 per annum;
-- was featured on Fox Business News ‘New To The Street’;
-- was featured on Uptick News Wire ‘Stock Day’ Podcast;
-- was approached to prepare a White Paper on cyber security for the Oil & Gas Industry for the American Petroleum Institute.
“As I have previously stated, it is important for an organization to have a clear and decisive game plan in order to be successful. Without a clearly defined set of objectives there is no definitive way of measuring success,” stated George Rutherford, President of Optium Cyber Systems, Inc. “Our objectives for the first quarter have all been met and we are very excited about new opportunities that have developed since, including an application in the blockchain sector.
“With everything that the company has on the table, management are very confident that our growth will continue to not only meet but exceed expectations,” continued Mr. Rutherford.
About Optium Cyber Systems, Inc.
Optium Cyber Systems, Inc. has developed a proprietary process to analyze, identify and address cyber security vulnerabilities in an organization’s critical IT infrastructure which is scalable to any size organization in any industry. The Company has recently launched in the health care sector, focusing on protecting health care facilities including hospitals, nursing homes and doctor’s offices from cyberthreats such as the manipulation of medical devices or theft of patient records. Optium Cyber Systems, Inc. is publicly traded having its common shares quoted on the OTC Markets under the symbol "OCSYD".
I feel a ground floor run coming. Glad we got all the heartache behind us!
They are deffinetly in a better position to grow.
Adding more OCSY is wound pretty right. On day its going to have a nice run.
How are we doing here? I was happy to see green popping back on HCEI!
Its a real company ground floor opportunity with $OCSY. Its easy to be bummed if your not instantly making money but now is the time to be soaking up all these shares. We could be back at 4,5's,6's in no time.
https://www.cnbc.com/2018/01/31/globe-newswire-optium-cyber-systems-welcomes-brigadier-general-retired-mark-g-beesley-to-advisory-board.html
Bid for 2's or wait for 1's?? My gut is not liking how this is going.
Look whats scheduled to happen right in $OCSYs back yard..
13th Annual API Cybersecurity Conference for the Oil & Natural Gas Industry
Registration Coming Soon
When: November 06, 2018 - November 07, 2018
Where: Marriott Woodlands Waterway, The Woodlands, Texas
http://www.api.org/products-and-services/events/calendar/2018/cyber
Open for Registration Details
Overview
Program Details
Workshops
Exhibitor Info
Exhibitors
Sponsors
Hotel
Call for Presentations - Available June 15, 2018
Conference Program - Available Soon
27-28 June 2018 API-IOGP Cybersecurity Europe Conference in London, UK
Protecting Energy Through Cybersecurity
Join us at the 13th Annual API Cybersecurity Conference & Expo and discover methods for thwarting the bad guys, what the scene looks like over the horizon and how the latest technologies can help you counter cyber espionage, address cyber warfare, and make your cyber efforts secure.
Cybersecurity is critical to the infrastructure of the oil and natural gas industry. The energy industry, including oil and natural gas, is ranked 2nd highest of all industries most likely to suffer a cyber attack. This conference is organized by API to provide an opportunity to network with cybersecurity professionals, and to candidly discuss challenges and share solutions. These sessions, essential to cybersecurity, are chosen and presented by recognized experts in the field.
Questions?
Registration: 202-682-8195 or registrar@api.org
Logistics or Sponsorship: cunninghamm@api.org
Share buyback!! Share buyback would make this soar!
That I agree with.. Time will tell..
I don't know, Do they? Do you know how many ISP connections they have or how many firewalls that need managed? etc. We don't have this information so its best not to guess at what would be needed to efficiently secure and protect the API.. JMHO
While you make a good point, as a CIO Ive used some of the big players in the past. The service and support tends to suffer as organizations such as Dell's secure works, and Cisco's Managed services grow. A smaller company can provide higher levels of support and companies take that into account when selecting managed security services. Also cost can be quite high with some of the larger players so I wouldn't discount Optimum Cyber out to easily IMHO.
I have faith it will I'm going to just keep loading quietly. Hey where are those Pics of the building at?
Maybe get some 2's if the impatient keep dumping..
Why the World Needs OCSY....
More News Expected from OCSY Next Week.
$OCSY has huge growth potential!!
Microsoft Rushes Out Fix for Major Hole Caused by Previous Meltdown Patch
Issue affects Windows 7 x64 and Windows Server 2008 R2 x64 systems.
Microsoft has rushed out an out-of-cycle security patch to address problems created by what were supposed to be fixes for the Meltdown vulnerability that it had previously issued for 64-bit Windows 7 and Windows Server 2008 systems.
In an advisory Thursday, the company urged anyone running Windows 7 for x64 systems or Windows Server 2008 R2 for x64-based systems to immediately install the new update. The advice applies to all organizations and users that have installed any of Microsoft's security updates during or after January 2018.
The update for CVE-2018-1038 stems from a warning by Swedish penetration tester Ulf Frisk that Microsoft's Meltdown patch for Windows 7 and Windows Server 2008 created a bigger hole than the one the patch was designed to fix.
The patch basically allowed any running process on these systems to read the complete contents in memory and to write to it as well. "Exploitation was just a matter of read and write to already mapped in-process virtual memory," Frisk said. "No fancy APIs or syscalls required — just standard read and write." The problem stemmed from a permission bit in a key memory table being set in "user" mode rather than "supervisor" mode.
"This made the page tables available to user-mode code in every process," rather than only by the kernel itself, Frisk said.
Chris Goetti, director of product management at Ivanti, says the vulnerability created by the Microsoft patch is pretty significant and something that needs to be addressed with haste, if possible.
"When Microsoft issued a fix for Windows 7 and Windows Server 2008, they made a mistake and ended up opening up read and write access in RAM so anybody could access anything in memory and write to it," he says. "It is a significant vulnerability and leaves those systems pretty much exposed" without the update.
At this point, those with affected systems should test the new patch quickly and roll it out. Another option for those that don't have the time to test the new patch will be to roll back the March update and wait for Microsoft's April update, which is due April 11.
"We are close to the April update," Goetti says. "Our guidance is to either apply the new update or roll back the March update," for Windows 7 x64-bit systems and Windows Server 2008 x64-bit systems, he says.
Organizations should not make the mistake of assuming the issue is related to Meltdown/Spectre and wait for things to settle down, cautions Jack Danahy, CTO and co-founder of Barkly. "This is an easy-to-exploit zero-day vulnerability and a much more probable attack vector that the original problem that Microsoft was trying to correct."
Unlike problems created by Spectre and Meltdown, "this isn't just a cleanup exercise. Microsoft accidentally distributed a new zero-day vulnerability of their own design."
The error is an example of the kind of issues that can crop up when things are rushed, he says. Fixing bugs is akin to serious software development, and it creates the same opportunities for mistakes, Danahy notes.
"I think that this will only serve to further deteriorate organizational willingness to apply patches automatically and without their own testing," he says. "I'm personally hoping that everyone deploys this patch to CVE-2018-1038, because this vulnerability is so easy to exploit that there are already exploit toolkits integrating it."
Why the World Needs OCSY....
More News Expected from OCSY Next Week.
$OCSY has huge growth potential!!
Microsoft Rushes Out Fix for Major Hole Caused by Previous Meltdown Patch
Issue affects Windows 7 x64 and Windows Server 2008 R2 x64 systems.
Microsoft has rushed out an out-of-cycle security patch to address problems created by what were supposed to be fixes for the Meltdown vulnerability that it had previously issued for 64-bit Windows 7 and Windows Server 2008 systems.
In an advisory Thursday, the company urged anyone running Windows 7 for x64 systems or Windows Server 2008 R2 for x64-based systems to immediately install the new update. The advice applies to all organizations and users that have installed any of Microsoft's security updates during or after January 2018.
The update for CVE-2018-1038 stems from a warning by Swedish penetration tester Ulf Frisk that Microsoft's Meltdown patch for Windows 7 and Windows Server 2008 created a bigger hole than the one the patch was designed to fix.
The patch basically allowed any running process on these systems to read the complete contents in memory and to write to it as well. "Exploitation was just a matter of read and write to already mapped in-process virtual memory," Frisk said. "No fancy APIs or syscalls required — just standard read and write." The problem stemmed from a permission bit in a key memory table being set in "user" mode rather than "supervisor" mode.
"This made the page tables available to user-mode code in every process," rather than only by the kernel itself, Frisk said.
Chris Goetti, director of product management at Ivanti, says the vulnerability created by the Microsoft patch is pretty significant and something that needs to be addressed with haste, if possible.
"When Microsoft issued a fix for Windows 7 and Windows Server 2008, they made a mistake and ended up opening up read and write access in RAM so anybody could access anything in memory and write to it," he says. "It is a significant vulnerability and leaves those systems pretty much exposed" without the update.
At this point, those with affected systems should test the new patch quickly and roll it out. Another option for those that don't have the time to test the new patch will be to roll back the March update and wait for Microsoft's April update, which is due April 11.
"We are close to the April update," Goetti says. "Our guidance is to either apply the new update or roll back the March update," for Windows 7 x64-bit systems and Windows Server 2008 x64-bit systems, he says.
Organizations should not make the mistake of assuming the issue is related to Meltdown/Spectre and wait for things to settle down, cautions Jack Danahy, CTO and co-founder of Barkly. "This is an easy-to-exploit zero-day vulnerability and a much more probable attack vector that the original problem that Microsoft was trying to correct."
Unlike problems created by Spectre and Meltdown, "this isn't just a cleanup exercise. Microsoft accidentally distributed a new zero-day vulnerability of their own design."
The error is an example of the kind of issues that can crop up when things are rushed, he says. Fixing bugs is akin to serious software development, and it creates the same opportunities for mistakes, Danahy notes.
"I think that this will only serve to further deteriorate organizational willingness to apply patches automatically and without their own testing," he says. "I'm personally hoping that everyone deploys this patch to CVE-2018-1038, because this vulnerability is so easy to exploit that there are already exploit toolkits integrating it."
Why the World Needs OCSY....
Microsoft Rushes Out Fix for Major Hole Caused by Previous Meltdown Patch
Issue affects Windows 7 x64 and Windows Server 2008 R2 x64 systems.
Microsoft has rushed out an out-of-cycle security patch to address problems created by what were supposed to be fixes for the Meltdown vulnerability that it had previously issued for 64-bit Windows 7 and Windows Server 2008 systems.
In an advisory Thursday, the company urged anyone running Windows 7 for x64 systems or Windows Server 2008 R2 for x64-based systems to immediately install the new update. The advice applies to all organizations and users that have installed any of Microsoft's security updates during or after January 2018.
The update for CVE-2018-1038 stems from a warning by Swedish penetration tester Ulf Frisk that Microsoft's Meltdown patch for Windows 7 and Windows Server 2008 created a bigger hole than the one the patch was designed to fix.
The patch basically allowed any running process on these systems to read the complete contents in memory and to write to it as well. "Exploitation was just a matter of read and write to already mapped in-process virtual memory," Frisk said. "No fancy APIs or syscalls required — just standard read and write." The problem stemmed from a permission bit in a key memory table being set in "user" mode rather than "supervisor" mode.
"This made the page tables available to user-mode code in every process," rather than only by the kernel itself, Frisk said.
Chris Goetti, director of product management at Ivanti, says the vulnerability created by the Microsoft patch is pretty significant and something that needs to be addressed with haste, if possible.
"When Microsoft issued a fix for Windows 7 and Windows Server 2008, they made a mistake and ended up opening up read and write access in RAM so anybody could access anything in memory and write to it," he says. "It is a significant vulnerability and leaves those systems pretty much exposed" without the update.
At this point, those with affected systems should test the new patch quickly and roll it out. Another option for those that don't have the time to test the new patch will be to roll back the March update and wait for Microsoft's April update, which is due April 11.
"We are close to the April update," Goetti says. "Our guidance is to either apply the new update or roll back the March update," for Windows 7 x64-bit systems and Windows Server 2008 x64-bit systems, he says.
Organizations should not make the mistake of assuming the issue is related to Meltdown/Spectre and wait for things to settle down, cautions Jack Danahy, CTO and co-founder of Barkly. "This is an easy-to-exploit zero-day vulnerability and a much more probable attack vector that the original problem that Microsoft was trying to correct."
Unlike problems created by Spectre and Meltdown, "this isn't just a cleanup exercise. Microsoft accidentally distributed a new zero-day vulnerability of their own design."
The error is an example of the kind of issues that can crop up when things are rushed, he says. Fixing bugs is akin to serious software development, and it creates the same opportunities for mistakes, Danahy notes.
"I think that this will only serve to further deteriorate organizational willingness to apply patches automatically and without their own testing," he says. "I'm personally hoping that everyone deploys this patch to CVE-2018-1038, because this vulnerability is so easy to exploit that there are already exploit toolkits integrating it."
Panera Website Data Leak
(April 2, 2018)
The Panera Bread restaurant website was leaking customer data for at least eight months until it was taken offline on Monday, April 2. The compromised data include names, email and physical addresses, birth dates, and the last four numbers of payment cards. The leak affected customers who had signed up for an account to order food online. The data were accessible in part because "Panera Bread uses sequential integers for account IDs."
Editor's Note
[Williams]
The corporate response to this vulnerability (which was actually the same vulnerability class repeated over and over throughout the Panera site) could literally be used as a case study of "what not to do." But more importantly, insecure user id generation and lack of authentication controls is web app penetration test 101. It would be very difficult to convince me that any penetration test has been performed on Panera's site as the sequential user IDs would have been found by any competent penetration tester in minutes. Organizations should examine the PR damage done to Panera and use this to justify penetration tests and security playbooks - both of which appear to be lacking here.
Upscale Department Store Payment System Breached
(April 1 & 2, 2018)
Payment systems at some brick-and-mortar Saks Fifth Avenue and Lord & Taylor department stores have been breached. As many as five million payment card numbers allegedly stolen from the stores' systems are being offered for sale online. The breach does not appear to affect online transactions. Both stores are owned by The Hudson's Bay Company, which says that steps have been taken to contain the breach.
Read more in:
- www.reuters.com: Saks, Lord & Taylor hit by payment card data breach
- www.scmagazine.com: Saks, Lord & Taylor breached, 5 million payment cards likely compromised
- www.theregister.co.uk: Hacks Fifth Avenue: Crooks slurp bank cards from luxury chain Saks
- www.nytimes.com: Card Data Stolen From 5 Million Saks and Lord & Taylor Customers
Under Armour Breach Affects 150 Million MyFitnessPal Accounts
(March 29, 30, & April 2, 2018)
Late last week, Under Armour disclosed that its MyFitnessPal app and website had been breached, exposing personal Account information of as many as 150 million accounts. The incident occurred in February 2018. The breach did not affect payment account data, as Under Armour processes that information separately.
Editor's Note
[Honan]
Under Armour was quick to respond to media queries and informed affected users in a timely manner. Well done. In today's threat landscape companies will not be judged on the fact they have a breach but rather how they respond to it.
Read more in:
- investor.underarmour.com: Under Armour Notifies MyFitnessPal Users Of Data Security Issue
- www.scmagazine.com: Under Armour deftly manages breach, dodges GDPR scrutiny
- www.zdnet.com: Under Armour says 150 million MyFitnessPal accounts hit by data breach
- threatpost.com: Under Armour Reports Massive Breach of 150 Million MyFitnessPal Accounts
Ole Tommy Tweets Alot says more news is coming soon. According to my source, I don't have a twitter account.. Can someone verify for me please.
$OCSY
My thoughts also, The AS was set so they sold some shares to help grow the business, so what. Now what they do with that money is what really matters. If its to hire some sales teams and technical folks great. They will need them to add contracts and service the new client base. After that they will need to start buying back and get the house in order. I'm here for the long-med term. I plan on picking up more at these levels and making a ton of money!!
GLTA