FireSale HackBoy

Knowledge Shared By FireSale HackBoy...

Sunday, June 30, 2019

Malware attack on Yandex Search engine of Russia by ‘Five Eyes’ Intelligence

Russian Internet Search Company ‘Yandex’ was cyber attacked by a malware named ‘Regin’ and the nation’s intelligence is pointing fingers at ‘Five Eyes’ Intelligence sharing alliance formed by Australia, New Zealand, Britain, United States, and Canada. Reuters which 1st shared the news piece with the world on Friday last week says that the attack was being carried out since October last year and added that the infiltration into the server network of Yandex continued till Nov’18. Yandex, the largest Russian tech firm which is reported to serve approximately...

Amazon data breach leaks sensitive info of Netflix, TD Bank and Ford

Data of Netflix, TD Bank and Ford was allegedly found exposed to hackers on an Amazon Storage bucket which was owned and maintained by data integration and management company ‘Attunity’. The incident was found when a team of researchers from UpGuard was casually looking for vulnerable points to be accessed on Amazon S3 Storage Buckets on May 13th of this year. The researchers from the Data Breach team of UpGuard argue that the oldest of the data found by them was uploaded in Sept’14. However, they are not clear if the leaked data was publicly accessible...

Saturday, June 29, 2019

Popular Android Zombie game phish users to steal Gmail credentials

By Waqas The app made its way to Google Play Store was also found phishing users for Facebook credentials. Scary Granny ZOMBY Mod: The Horror Game 2019 is the latest game on Google Play Store that is condemned by the digital security fraternity for sneakily stealing personal data from unsuspecting users. The game, which has been downloaded […] This is a post from HackRead.com Read the original post: Popular Android Zombie game phish users to steal Gmail credentials June 29, 2019 at 11:18...

Friday, June 28, 2019

Crooks steal $28M in crypto using Google Adwords & spoofed domains

By Uzair Amir Authorities arrested six suspects including five males and one female in simultaneous raids carried out in a joint operation. The raids and subsequent arrests were carried out to trace $28 million worth of stolen Bitcoin.  The raids were conducted as part of a 14-month long, large-scale, global police investigation involving European law enforcement agencies including […] This is a post from HackRead.com Read the original post: Crooks steal $28M in crypto using Google Adwords & spoofed domains June 28, 2019 at 09:38...

2019 top Cloud Security Certifications

As Cloud Computing industry is ever evolving, the workforce has to be re-trained from time to time with updated skills and certifications in order to support the evolving environments. Cloud Security industry is no exception as the workforce has to train their skills as per the new opportunities in order to live up to the horizon. And the best certification for an individual or the enterprise depends on variables such as industry demand, business needs, cloud platforms, and vendor agnostics. Two such standout certifications which seem to be evergreen...

Mozilla’s ‘Track This’ lets you choose fake identity to deceive advertisers

By Waqas Track This is a new kind of incognito, says Mozilla. It is a fact that everything that you do on the Internet such as using Facebook or Twitter, online shopping or aimlessly surfing the web, is being tracked. Haven’t you noticed that as soon as you search for something, ads relevant to the search start […] This is a post from HackRead.com Read the original post: Mozilla’s ‘Track This’ lets you choose fake identity to deceive advertisers June 28, 2019 at 08:32...

Bitglass Security Spotlight: Canada’s Largest Credit Union Suffers Massive Data Breach

This post was originally published here by Will Houcheime . Here are the top cybersecurity stories of recent weeks:   Desjardins experiences data breach exposed by previous employee Emuparadise forum member information disclosed Venmo transactions scraped as privacy settings warning Maryland medical records uncovered The US Customs and Border Patrol claim hacked travelers Desjardins, Canada’s largest credit union, exposed by ex-employee Desjardins recently discovered that an employee gained access to a database containing information...

EMEA SKILLS GAP PUTS CYBER WORKERS AT A DISADVANTAGE AGAINST ATTACKERS

This post was originally published here by (ISC)² Management. A severe cybersecurity skills gap in EMEA (European, Middle East and Africa) is making it hard for cybersecurity staff to cope with their workloads or acquire the skills they need to handle emerging technologies, according to a new report by Symantec. Cybersecurity workers believe they are at a serious...

THE PARENT TRAP: LACK OF KNOWLEDGE HOLDS CHILDREN BACK FROM CYBERSECURITY CAREERS

This post was originally published here by (ISC)² Management. Parents can play an influential role in their children’s choice of careers but when it comes to cybersecurity, most parents have no advice to give. That’s because they really don’t know much, if anything, about the subject. A survey by cybersecurity training provider SANS Institute revealed that 63% of parents in the U.K. can’t answer questions about how to find a job in the cybersecurity field. Almost as many parents (61%) said they have little or no knowledge of any...

Thursday, June 27, 2019

Acquisitions happening in the field of Artificial Intelligence

UBER, an American multinational transportation sharing company has formally announced that it has acquired computer vision startup ‘Mighty AI’ for an undisclosed amount. The financial details of the deal remain undisclosed, but over 40 employees of the company which produces tech for self-driving cars are said to join UBER by next month end. Mighty AI offers software that helps self-driving cars to access their surroundings by autonomously identifying and distinguishing the objects surrounding the vehicle. “Uber is said to use the tech to enhance...

Office 365 Phishing Protection – Is Native Microsoft Protection Safe?

By ghostadmin For the last couple of years, there has been a surge in phishing attacks against businesses and unsuspecting users. What’s worse is that phishing, which was previously merely a fraudulent attempt to obtain sensitive information, is now spreading malicious content including ransomware. While tech and cybersecurity companies are focusing on providing top-notch security to their […] This is a post from HackRead.com Read the original post: Office 365 Phishing Protection – Is Native Microsoft Protection Safe? June 28, 2019 at 04:17...

ViceLeaker Android malware steals call recordings, photos, videos & texts

By Waqas Israeli Citizens are the Primary Target of New Android Mobile Spying Campaign Using ViceLeaker Malware, says Kaspersky. Kaspersky Lab researchers discovered an Android malware campaign active since 2016 and still going strong. Dubbed ViceLeaker; researchers claim that it is the product of a group of hackers that is specifically targeting Middle Eastern and Israeli citizens. […] This is a post from HackRead.com Read the original post: ViceLeaker Android malware steals call recordings, photos, videos & texts June 27, 2019 at 08:13...

The Parent Trap: Lack of Knowledge Holds Children Back from Cybersecurity Careers

Parents can play an influential role in their children’s choice of careers but when it comes to cybersecurity, most parents have no advice to give. That’s because they really don’t know much, if anything, about the subject. A survey by cybersecurity training provider SANS Institute revealed that 63% of parents in the U.K. can’t answer questions about how to find a job...

Cyber Attack news trending now on Google

1.) Paying a ransom to hackers seems to be picking up as a trend these days as another city from Florida is alleged to have bowed down to the demands of hackers on a recent note. On Tuesday this week, the news was out that the Lake City of Florida has paid hackers up to $460,000 in Bitcoins to free-up its database from file-encrypting malware. And the news comes just days after Riviera beach of Florida has made it official that it has paid to hackers $600,000 in digital currency to recover from a ransomware attack. What’s interesting in this fact...

Wednesday, June 26, 2019

Ransomware attack on Auburn Food Bank

Auburn Food Bank of Washington has admitted that it has become a victim of a ransomware attack recently bringing its entire computer network to halt. The authorities have confirmed that only one PC on the network was safe from being encrypted and so is being used for the digital charity activities for time being. Auburn Food Bank which is located in King County of Washington is known to provide food for the families and individuals residing in and around the Auburn School District. At 2 am on June 5th of this year the non-profit organization was...

Bad Cyber Security practices in 8 Government Agencies

Over 8 government agencies have been reported for practicing bad when it comes to following a cybersecurity protocol while handling data of US populace, thus exposing it to hackers. The report which was made public yesterday by US Senators Rob Portman and Tom Carper, the high ranking members and chairman of US Senate Permanent Subcommittee on Investigations related to Homeland Security and Governmental Affairs. Cybersecurity Insiders has learned that the report was compiled after analyzing data of the past ten years pertaining to Inspector General...

EMEA Skills Gap Puts Cyber Workers at a Disadvantage Against Attackers

A severe cybersecurity skills gap in EMEA (European, Middle East and Africa) is making it hard for cybersecurity staff to cope with their workloads or acquire the skills they need to handle emerging technologies, according to a new report by Symantec. Cybersecurity workers believe they are at a serious disadvantage against attackers. Simply finding the time to learn emerging...

New Windows 10 bug causes PCs to take longer to shut down

By Uzair Amir Windows 10 bug: If you have a device connected via cable to the USB Type-C input, you may have to wait another minute to turn off your computer – The bug exists in USB Type-C Connector System Software Interface (UCSI) software. The new bug in Windows 10 is not a serious one, but it somewhat […] This is a post from HackRead.com Read the original post: New Windows 10 bug causes PCs to take longer to shut down June 27, 2019 at 03:42...

New attack spreads LokiBot & NanoCore malware in ISO image files

By Waqas Both NanoCore and LokiBot are Info-stealing Trojans. Security researchers at the San Francisco-based firm Netskope have discovered a new malware campaign distributing the info-stealer malware LokiBot and NanoCore via ISO image file attachments that appear to be an invoice. It is noteworthy that LokiBot malware was discovered back in October 2017 and is equipped with […] This is a post from HackRead.com Read the original post: New attack spreads LokiBot & NanoCore malware in ISO image files June 26, 2019 at 07:51...

EMEA Skills Gap Puts Cyber Workers at a Disadvantage Against Hackers

A severe cybersecurity skills gap in EMEA (European, Middle East and Africa) is making it hard for cybersecurity staff to cope with their workloads or acquire the skills they need to handle emerging technologies, according to a new report by Symantec. Cybersecurity workers believe they are at a serious disadvantage against attackers. Simply finding the time to learn emerging...

Microsoft bans employees from using these apps for Security reasons

Microsoft has already banned the use of rival apps and services from Google and Amazon. Now it seems to have extended the list by adding a few early this month. According to a report being circulated internally by Microsoft, the Redmond giant has banned the use of apps such as the free version of slack among its employees. This includes the use of Slack Free, Slack Standard, and Slack Plus versions as they do not provide proper security controls to protect the intellectual property of the software giant. According to Microsoft’s internal report...

7 Easy-to-Use Java Performance Tuning Tips

By Owais Sultan Are you looking for easy-to-use Java performance tuning tips because you want to learn more developer knowledge and experience because of the current over-complicated process of optimization techniques? With a bit of practice, there are a few easy ways to learn best practices that allow you to build and optimize a well-designed and executed application. […] This is a post from HackRead.com Read the original post: 7 Easy-to-Use Java Performance Tuning Tips June 26, 2019 at 04:13...

How Phishing Has Evolved in 2019

By David Balaban Phishing attacks host every kind of malware and ransomware attack but what’s worse is that these attacks are on the rise. Starting in 2012, ransomware took the Internet by storm, thanks to latest phishing techniques. Unsuspecting and unprepared users, both individuals and businesses, found their screens frozen, their data no longer their own, and the […] This is a post from HackRead.com Read the original post: How Phishing Has Evolved in 2019 June 26, 2019 at 03:39...

Tuesday, June 25, 2019

How Doxing can prove as a threat to Cloud Security

Before getting into the details on how ‘Doxing’ could pose a threat to cloud security, let’s first understand the term in a technical way. Well, it is the term which gained momentum from situations where hackers gain personal details of targets and used that data to embarrass them on a further note. Often cyber crooks are seen screening email & social media accounts of celebrities to access and then later publicly post their memorabilia such as N%$E photographs of celebrities on public platforms- either to gain financially or to further embarrass...

Cellular networks worldwide hit by hackers in espionage attempt

By Uzair Amir Cybereason, an Israeli-US security firm based in Boston, has reported that certain nation-state hackers managed to compromise the systems of no less than ten cellular carriers across the globe to steal metadata of specific users. Without naming anyone, the company claims that the targeted users and the attackers both belong to China.  The campaign is […] This is a post from HackRead.com Read the original post: Cellular networks worldwide hit by hackers in espionage attempt June 25, 2019 at 09:10...

Telecommunication Companies across the world are hacked

Over a dozen Mobile Carriers from across the world are reported to be under the control of hackers who could shut down the mobile network creating a partial or total blackout any time soon! Yes, you’ve read it right! A Boston based security company named Cybereason has discovered the above-said fact in its recent study and added that hackers are holding tons of data by taking control of databases of most of the phone network providers operating in Asia, Africa, Europe, and North America along with the Middle East. News is out that the infiltration...

Researchers exploit LTE flaws to send 50,000 fake presidential alerts

By Waqas Researchers managed to cover a 50,000 seat football stadium using only four malicious portable stations. A group of security researchers from the University of Colorado Boulder has published a paper detailing the findings of their latest research revealing that LTE vulnerabilities can help attackers send out fake presidential alerts. To do this, they only need […] This is a post from HackRead.com Read the original post: Researchers exploit LTE flaws to send 50,000 fake presidential alerts June 25, 2019 at 07:29...

9 risky apps that you need to monitor on your kids’ smartphone

By Owais Sultan Parents should know if their under 18 child has these apps on their smartphone – No underage child should use these apps. Apart from being a great invention, smartphones are also taken as a most apt tool for killing time. Kids between the age of 11-19 spend 90 percent of their times on their cell […] This is a post from HackRead.com Read the original post: 9 risky apps that you need to monitor on your kids’ smartphone June 25, 2019 at 05:03...

Monday, June 24, 2019

Google Trending News related to Cybersecurity

1.) A sting operation carried out by a security researcher from Emsisoft has found that ransomware recovery firm in the UK named RedMosquito has been simply negotiating ransom payments with hackers and charging the clients with inflated bills. Going into the details, the UK firm which specializes in rescuing machines infected with malware; when contacted by ransomware victims analyzes the infection range and then starts negotiating with the hackers to offer a decryption key. After finishing off the activity with the hackers, it then starts levying...

Insecure data storage causing Mobile Security vulnerabilities

Security researchers argue that insecure storage on mobile phones is creating vulnerabilities to be exploited by hackers for accessing sensitive info from both Android and iOS apps. The study carried out by a security company named Positive Technologies says that 76% of mobile applications open up data to be accessed by hackers leaking out insightful info like personal data, financial info, passwords-all due to the presence of unprotected data storage on the device. Leigh Anne Galloway, a lead Cybersecurity researcher from Positive Technologies...

New cryptomining botnet malware hits Android devices

By Uzair Amir Cryptomining malware has become a substantial threat against unsuspecting Android users. In a research conducted by the Tokyo-based cybersecurity and threat defense firm Trend Micro, it was revealed that there is a new cryptomining malware bot that’s particularly targeting Android devices. The miner exploits the Android Debug Bridge port system of the device that performs […] This is a post from HackRead.com Read the original post: New cryptomining botnet malware hits Android devices June 24, 2019 at 10:05...

One Year Later: Finding Harmony between GDPR and the Cloud

Like any budding relationship, there is always a period of trial and error. Expectations are set high, and intentions are meant to meet them, but mistakes can happen. There are lessons to be learned in the fumbles and hopefully a way to improve! As the EU embarked on a new relationship with the GDPR (General Data Protection Regulation) Council, new regulations were firmly...

Can facial recognition and artificial intelligence humanize air travel?

Facial recognition and artificial intelligence (AI) technologies can help us make the travel experience less alienating. This may seem like a very controversial statement, but let’s explore it further before we jump to any conclusions. Many of us have experienced a marathon journey through an airport, dreading the endless queues and repeated security processes, leaving us...

Ransomware attack on Eurofins cuts of its ties with UK Police

Belgium based scientific testing laboratory Eurofins has unfortunately encountered a ransomware attack on its digital assets on June 2nd this year. And the security breach has made the UK police suspend its ties with Europe’s forensic firm. Technically speaking, the firm which is actually headquartered in Brussels provides clinical research for companies and government organizations with regards to pharma, Agro, food, consumer products, and environmental studies. Eurofins is reported to run more than 800 labs across 47 nations located in Asia-Pacific,...

Sunday, June 23, 2019

Ministry of Justice MoJ publishes new rules for Cloud Security

The Ministry of Justice (MoJ) has published the latest set of rules for the users of public cloud services provided by Amazon Web Services (AWS). The rules were outlined as a part of new digital services which offer over 800 different technology systems to be integrated with the use of public and private clouds. In general, the federal executive department mainly uses AWS and Microsoft Azure for its cloud computing needs. But strictly speaking, it has populated much of its projects and apps over 120 AWS accounts, making the service provider as...

US Cyber Attacks on Iran

Hundreds of systems including those belonging to Iranian Intelligence Group which involved in downing the drone of US & oil tankers were allegedly cyber-attacked by US Intelligence Group from Pentagon on early hours of Friday this week. Reason for infiltrating into the networks of Iranian government officials was simple– to retaliate to the activities of Iran and warn then against more such serious consequences if they fail to mend their ways on the international arena. Cybersecurity Insiders has learned that the intrusion was planned on the...

Saturday, June 22, 2019

Hackers using pirated software to spread new cryptomining Mac malware

By Waqas If you download pirated content from torrent platforms, you can be a victim of this Mac malware. There is a new variant of cryptomining malware that is specifically targeting Apple’s Mac devices and those users who prefer downloading pirated software from torrent platforms. Dubbed Bird Miner by researchers; this cryptocurrency mining malware is actually a […] This is a post from HackRead.com Read the original post: Hackers using pirated software to spread new cryptomining Mac malware June 22, 2019 at 08:43...

The Newspaper Test

This post was originally published here by Dave Rogers. Does your cybersecurity solution measure up to the “newspaper test?” We’ve all seen the news headlines about data breaches, malware attacks, and other security debacles at some of the top companies and organizations around the world. How often these incidents occur is increasing due to the lack of security that these organizations are implementing when migrating to the cloud. In our latest report, Kings of the Monster Breaches, we examine some of the biggest breaches that have occurred...

Glass Class: Securing Patient Data in the Cloud

This post was originally published here by Will Houcheime. Organizations that operate within the healthcare industry have an immense responsibility to secure protected health information (PHI), personally identifiable information (PII), and other highly sensitive data. Additionally, the need for mobility in healthcare is critical because employees like doctors often have multiple affiliations, meaning that they access data remotely from personal devices as they travel from hospital to hospital. In our latest Glass Class, we introduce some security...

SMALL BUSINESSES NOT THE WEAKEST LINK IN THE SUPPLY CHAIN, STUDY SHOWS

This post was originally published here by (ISC)² Management. A new (ISC)2 study suggests that small businesses may get too much attribution for causing security breaches for their large enterprise clients. While it’s true that enterprises have suffered breaches caused by third parties, they are more likely a result of actions by a large partner, not a small business. The Securing the Partner Ecosystem study, which polled respondents both at large enterprises and small businesses, revealed about one third of enterprises (32%) have experienced...