FireSale HackBoy

Knowledge Shared By FireSale HackBoy...

Monday, December 31, 2018

Devastating Malware Attacks of 2018

The year 2018 has just passed and a hearty welcome to 2019! Hope, this year brings an immense success, joy and wealth to all our readers of Cybersecurity Insiders along with good health- as that’s the need of the hour to many.  Coming to the article of ‘devastating virus attacks of 2018’ cybersecurity firm REVE has compiled a list of top viruses which hit the news headlines in 2018 and the list is as follows- Coin Miner- This virus was launched to target those using Mac computers and is basically a cryptocurrency mining malware and was found...

The Bitglass Blog

Way back in 2013/14, Cloud Access Security Brokers (CASBs) were first deployed to identify Shadow IT, or unsanctioned cloud applications. At the time, the prevailing mindset amongst security professionals was that cloud was bad, and discovering Shadow IT was viewed as the first step towards stopping the spread of cloud in their organization. Flash forward just a few short years and the vast majority of enterprises have done a complete 180º with regards to cloud, embracing an ever increasing number of “sanctioned” cloud apps. As a result, the...

5 Common DNS Attacks

The Domain Name System (DNS) security directly impacts both end users and service providers, as the system’s critical nature makes it a sought-after target for those attempting to compromise or disrupt Internet services via DNS attacks.   DNS is the Internet directory that allows the translation of domain names/URLs into IP addresses and is a critical component of how users are able to interact with the vast number of resources at their fingertips. DNS is deployed in a hierarchy where root level DNS servers communicate with top-level domains,...

Major US newspapers suffer malware attack; printing & delivery affected

By Waqas It is believed that the malware attack was carried out from outside the United States. The Los Angeles Times suffered a malware attack earlier this Saturday that disrupted printing and delivery process for several of its print editions across the country, the newspaper said. The malware attack, according to LA Times, was conducted from “outside” the […] This is a post from HackRead.com Read the original post: Major US newspapers suffer malware attack; printing & delivery affected December 31, 2018 at 05:36...

The biggest data breaches of all times till date

All these days Cybersecurity Insiders has reported to its reader’s info about the news of cyber attacks and the top data breaches which happened in the current year. But on the last day of this year, it would like to bring to your notice a list of the largest reported data breaches of USA in order of magnitude. Yahoo! – The year 2016 witnessed the said web search giant hitting the news headlines two times. One was in March’16 and the other was in Sept’16 for the leak of customer information related to over 500 million accounts. Marriott- The month...

Sunday, December 30, 2018

Cyber Attack news for the last day of this year 2018

1.) France based security engineers have found a software tool to navigate and monitor the dark web. But they also argue that the tool could spell deep trouble to the web users if it falls into wrong hands. Nicolas Hernandez, the Co-founder, and CEO of Aleph Networks, a company based in Lyon- France said that his company rejected over 30 to 40 licensing requests for its newly found software tool named as the “ Google of the Dark Web” in 2018 and will probably stick to it in the coming year as well. As some website owners like to operate with anonymity...

RYUK ransomware disrupts US Newspaper distribution

RYUK ransomware is said to have disrupted the US Newspaper distribution from California and Florida on Saturday last week. Thus, the cyber attack which appeared to have originated outside the United States is said to have led to a 4-hour delay in the distribution of news editions related to Times, the Tribune, the Sun and other news resources majorly operating from Los Angeles. Sources say that the news sharing network services of Los Angeles Times, Chicago Tribune, Wall Street Journal, and New York Times were majorly hit by the virus attack disrupting...

Researchers exploit Vein-based authentication system using a wax hand

By Waqas Biometric authentication is currently a widely used option for maintaining the security of devices and systems. With the emergence of vein-based authentication, biometric verification has moved beyond facial recognition and fingerprints. Vein-based authentication involves scanning of the size, shape, and location of the users’ veins under their hand’s skin to verify the person. On paper […] This is a post from HackRead.com Read the original post: Researchers exploit Vein-based authentication system using a wax hand December 29, 2018 at...

Saturday, December 29, 2018

Hackers steal credit card data of 14,579 BevMo customers

By Uzair Amir A warning has been issued by the Concord, California-based alcoholic beverages retailer BevMo informing its customers about a data breach that its online store experienced between 2 August and 26 September. During the attack, credit card data of its customers was exposed. “BevMo takes the privacy of our customers’ personal information seriously and we deeply […] This is a post from HackRead.com Read the original post: Hackers steal credit card data of 14,579 BevMo customers December 29, 2018 at 09:26...

Hackers steal personal details of 1,000 North Korean Defectors

By Uzair Amir The data breach against North Korean Defectors came after hackers targeted computer at Resettling agency. Private data of approx. 1,000 North Korean Defectors present in the South have been exposed in a data breach which makes them vulnerable to all sorts of threats from the North, claims the officials from the Unification Ministry. According to […] This is a post from HackRead.com Read the original post: Hackers steal personal details of 1,000 North Korean Defectors December 28, 2018 at 09:37...

Hackers steal Bitcoin worth $750,000 by hacking Electrum wallets

By Waqas This year we have seen an unprecedented rise in malware attacks against cryptocurrency wallets whereas cryptomining incidents have increased by 4,000%, reports McAfee. The latest attack on well-known Bitcoin wallet Electrum further proves that malware attacks on crypto wallets are indeed on a rise. According to reports, Electrum Bitcoin wallet has been attacked and hackers […] This is a post from HackRead.com Read the original post: Hackers steal Bitcoin worth $750,000 by hacking Electrum wallets December 28, 2018 at 08:28...

School hackers steal personal data of half a million students & staff

By Waqas A school district in the United States has suffered a cyber attack in which unknown hackers managed to steal a trove of personal data belonging to over 500,000 staff and students. The targeted school was San Diego Unified School District in California whose database was accessed by hackers just before Christmas allowing them to steal 10 years […] This is a post from HackRead.com Read the original post: School hackers steal personal data of half a million students & staff December 27, 2018 at 11:45...

These people don’t exist – They were created by tech using Artificial Intelligence

By Waqas Artificial intelligence is increasingly advanced and has entered more and more areas, even in the most unexpected and sensitive issues for society such as the world’s first AI lawyer Ross. Now, tech giant NVIDIA has developed a tool that uses Artificial Intelligence to create extremely realistic human faces. See: This man is creating chatbot for his mom […] This is a post from HackRead.com Read the original post: These people don’t exist – They were created by tech using Artificial Intelligence December 27, 2018 at 06:58...

Bitglass Security Spotlight: Quora and Healthcare Breaches

This post was originally published here by Will Houcheime. Here are the top cybersecurity stories of recent weeks:  100 million Quora users affected by data breach First multi-state healthcare breach impacts 3.9 million Australia’s anti-encryption bill becomes law Unprotected MongoDB server exposes 66 million Malware attack undetected for four years 100 million Quora users affected by data breach Quora, a website that allows users to inquire about different topics for credible feedback, was recently attacked by hackers. This website has...

SaaS Apps And the Need for Specialized Security

This post was originally published here by  Paul Sullivan. Keeping cloud services running is a complex, multi-faceted endeavor for cloud service providers. They need to juggle adding new features, keeping their customers’ sensitive data secure, and having high uptime for their services – there is virtually no room for error. Microsoft learned about the need for high uptime a few weeks ago when they suffered a four-hour outage for users with multi-factor authentication enabled on their Azure and Office 365 services. For...

Bitglass: a one-way trip to Secureland

This post was originally published here by Michael Tamayo. It’s that time of year again – the time to spend with those you hold dear so you can look back and reflect on the past year. If we look back even further, we can see the progress from our humble (yet ambitious) beginnings to our current position as a leading solution in the cloud access security broker (CASB) space. We are immensely proud of our achievements, but even more proud of our team who worked tirelessly to get us to where we are now. We could not have made it to this point without...

CISSP-ISSAP MEMBERS: YOUR FEEDBACK IS REQUESTED

This post was originally published here by (ISC)² Management . (ISC)² regularly conducts Job Task Analysis (JTA) studies to review and update the content outline of its credentialing examinations. A JTA is the methodical process used to determine tasks that are performed by credential holders and knowledge and skills required to perform those tasks successfully. Results of the JTA study link a candidate’s examination score directly to the domain knowledge being tested. A JTA Study Workshop for CISSP-ISSAP has tentatively been scheduled toward...

Friday, December 28, 2018

99 Free Privacy Tools That Will Keep You Safe Online

...

Thursday, December 27, 2018

China puts chips on children’s school uniforms for surveillance

If you think that the China’s penchant to spy on its populace has hit a saturation point, here’s more to add to it. All schools in Southern China have been asked to implement a new rule to force children to wear micro-chipped uniforms in order to track down truants. The objective of this extensive surveillance is to inform the parents of the children if their skip classes or if are caught doing mischief. While the children below 10 don’t have a problem in being monitored, the teenage lads are found opposing the new rule to the core. As per the...

FBI seizes firms offering Cyber Attacks-on-Demand

US Department of Federal Bureau of Investigation (FBI) has announced that it has seized over 15 internet domains and has charged around 14 men associated with firms that offer cyber attacks-on-demand. The law enforcement agency has added in its statement that the firms were found indulging in malicious practices such as spreading malware and launching ransomware and DDoS attacks on several computer networks related to financial institutions, universities, internet services providers, government organizations and gaming platforms. Some of the domains...

How Malware Sandboxes and SIEMs Work in Tandem to Effectively Detect Malware

Rohan Viegas of VMRay explains some of the key factors IT security teams should consider when evaluating a malware analysis sandbox and whether it’s a good fit for their existing SIEM environment. He then outlines how VMRay Analyzer complements and enhances the capabilities of AlienVault’s flagship platform, USM Anywhere. For IT security organizations, malware threats and...

Bitglass: a one-way trip to Secureland

It’s that time of year again – the time to spend with those you hold dear so you can look back and reflect on the past year. If we look back even further, we can see the progress from our humble (yet ambitious) beginnings to our current position as a leading solution in the cloud access security broker (CASB) space. We are immensely proud of our achievements, but even more...

Wednesday, December 26, 2018

Devastating Cyber Attacks of 2018

Want to know the details of the most devastating cyber attacks of 2018. Then Cybersecurity Insiders brings to you a synopsis of those which hit the headlines in this year.  Marriott Hotel Cyber Attack- In November 2018, Starwood Hotels a subsidiary of Marriott International admitted that its hotel guest database was accessed by hackers since 2014 and possibly information pertaining to over 500 million customers could have been stolen in the data breach. The statement released by the hotel and resorts giant said that the unauthorized access...

Ransomware attack exposes data of 16K patients from Georgia health center

A Ransomware attack launched on the database of Mind and Motion Developmental Center in Georgia is said to have exposed over 16,000 patient records. A spokesperson from the healthcare said that the attack was discovered on Sept 30 this year but was made public only after a preliminary investigation was conducted and results were obtained. News is out that the malware attack led to the leak of personal details such as patient names, addresses, birth dates, medical records, social security numbers, and insurance data. According to a forensic report...

Holiday and Christmas scams users should be aware of

By Carolina “It’s that time of the year again” when Holiday and Christmas scams target users around the world since millions of people are celebrating and buying gifts for friends and family. Most people prefer shopping online and that is where hackers and cybercriminals take full advantage of the situation and scam unsuspecting users. Here are some Holiday and Christmas scams you […] This is a post from HackRead.com Read the original post: Holiday and Christmas scams users should be aware of December 24, 2018 at 11:0...

Nokia exposes passwords & secret access keys to its internal systems

By Waqas Another day, another data breach – This time, multinational tech giant Nokia has been caught exposing highly sensitive data of industrial nature that would have put its internal security at risk. The data was discovered by the director of the cyber risk research team at Hacken and Hackenproof Bob Diachenko during routine Shodan security audit on December […] This is a post from HackRead.com Read the original post: Nokia exposes passwords & secret access keys to its internal systems December 24, 2018 at 06:29...

CISSP Spotlight: Amy Mitchell

Name: Amy Mitchell Title: Managed Services Engineer Employer: KnowBe4 Location: Clearwater, FL, U.S. Education: Associates of Science Years in IT: 6 Years in cybersecurity: 4 Cybersecurity certifications: Security+, CISSP   How did you decide upon a career in cybersecurity? I realized how important PCI DSS security is when I worked in the service industry. From there,...

Tuesday, December 25, 2018

Information Security Digital Privacy law tops EU Google’s Search List 2018

From May 25th, 2018 European Union announced the world’s toughest rules for companies offering online services to the populace of the region. And the internet juggernaut Google has claimed that its search engine was fueled with queries related to the digital privacy law in the whole of 2018. As per the most search stats released by the Alphabet, Inc.’s subsidiary yesterday, what is GDPR, what is a bitcoin, digital privacy law EU, and the Brexit repercussions on European Union were the most searched terms by the populace in between June- Dec’18. The...

A study on Cyber Threats to Automated Cars

Authorities in Japan are intending to launch a study on the cyber threats that could target self-driving cars. The research is meant to prepare the country’s law enforcement to deal with such attacks and keep the populace safe from any untoward incident. Self Driving cars are those which use internet access for navigation and Japan’s National Police Agency is worried that such cars could become easy targets for crime doers. As the government of Japan is planning to launch autonomous car services on expressways by 2020 in order to give a big transportation...

Artificial Intelligence tops Google Search List in 2018

When it comes to ‘technology’, ‘Artificial Intelligence’ shortly & widely known as ‘AI’ is said to have topped the Google Search List in 2018. And mind you, the list was released by Google today and includes only those search terms hitting the news headlines in between Dec’17 to Dec 18th,2018. Among the trends, the top searched term happens to be about the ‘Microsoft’s AI Commercial’ followed by the news related to 4 AI robots which killed 29 scientists in Japan. Rapper ‘Common’ aka Lonnie Corant Jaman Shuka Rashid Lynn became a household face...

Monday, December 24, 2018

Cloud Startup gains $100 M funding to build secure data centers in Satellites

After exploring land and the water to build data centers, scientists are now finding ways to build secure data centers in a network of satellites operating in Low Earth Orbit (LEO). In fact, a new startup has taken a step ahead in the process by gaining a $100M funding for its Space Laser Cloud Security. Cloud Constellation is the company in the discussion which has received a series B funding of $100M from Hong Kong-based HCH Group Company. Cloud Constellation which made to news headlines with its SpaceBelt Data Security-as-a Service plans to...

Critical Digital US Infrastructure to be protected by “Dark Side”

An Idaho based National laboratory has been assigned the duty to protect the critical infrastructure of the nation from the next fall at a cost of $80 million. And the news is out that the lab is on a hiring spree and is looking for all technology enthusiasts irrespective of their college degrees or the study status they hold. Named as the “Dark Side” the facility is already buzzing with 50 workers who prefer to keep the lights low and the brightness of their computer screens dim. The aim of the facility is to protect digital systems from hackers...

The Dangers of Free VPNs

If you use a free VPN, then you have to wonder how your provider earns money to cover their own costs. The answer often involves advertising, but it can also be through far more sinister means. Running a VPN service costs a significant amount of money. There are setup costs, infrastructure costs, labor and other running costs. The companies behind these services generally...