FireSale HackBoy

Knowledge Shared By FireSale HackBoy...

Monday, September 30, 2019

Major regional hospitals in Victoria hit by a ransomware attack

Health services in Victoria took a major jolt when the IT infrastructures of some of the major regional hospitals operating in the region were hit by a ransomware attack. This includes Gippsland Health Alliance and South West Alliance of Rural Health along with health care service providers in Warrnambool, Colac, Geelong, Warragul, Sale, Bairnsdale, and other services in smaller towns. Highly placed sources say that the services came to a halt since 3 Pm on Monday and the law enforcement agencies along with a third party Cybersecurity service provider...

Ransomware attack on Demant fetches $95 million loss and FBI on Meridian Cyber Attack

Denmark based hearing aid manufacturer Demant has released an official statement yesterday stating that the ransomware attack which took place on its database early last month could fetch a $95 million loss to the company in the current financial year. The loss includes disruption of services, recovery, IT staffs extra pay to probe and contain the incident, purchase of new hardware and software and compensation if in any case has affected the clients. Readers of Cybersecurity Insiders have to notify that the incident impacted heavy loss to company’s...

Looking to Break into Cybersecurity Without Direct Experience? Find Out How

The cybersecurity skills gap means companies are scrambling to fill security positions, and that presents an opportunity for you to find security work – even without direct experience. Faced with a critical shortage of qualified candidates, organizations are increasingly taking chances on nontraditional applicants and training them for security roles. One way to bridge a cybersecurity...

Thousands of Windows PCs infected by Nodersok/Divergent fileless malware

By Sudais A new fileless malware is on the rise which converts computers into bots that can be controlled by hackers remotely. This is a post from HackRead.com Read the original post: Thousands of Windows PCs infected by Nodersok/Divergent fileless malware September 30, 2019 at 11:25...

Dark web data center in former NATO bunker seized for hosting child porn

By Waqas Authorities raided and seized a massive data bunker called “Cyberbunker 2.0” used by dark web criminals to run drugs, explicit child content. This is a post from HackRead.com Read the original post: Dark web data center in former NATO bunker seized for hosting child porn September 30, 2019 at 09:43...

Cybersecurity Audits Are Now Standard Practice in M&A

Cybersecurity threats are a major concern for businesses of all sizes, and that challenge can have repercussions when a company puts itself on the selling block. One of the things buyers will want to know is whether the company has had a breach and, if so, how it was handled. If the business can show it addressed the breach in a satisfactory way and learned from the experience...

Malware turning Microsoft PCs into Zombie Proxies n new details on Baltimore ransomware attack

Researchers from Cisco Talos in commission with Microsoft have discovered a new kind of malware strain which is being dubbed as Zombie Proxies. News is out that the malware has already infected thousands of PCs across the US and Europe and is being technically called as Nodersok and Divergent by Microsoft respectively. According to the sources reporting to Cybersecurity Insiders the malware campaign which is currently active only in western countries makes users download and run an HTML app often distributed by malicious ads. The malicious tool...

Sunday, September 29, 2019

Cyber Threat to IRAN’s oil and energy sector

Iran’s petroleum sector is on high alert as it has received a tip-off from its intelligence agencies that adversaries of the country might launch a physical or a digital cyber attack on the critical infrastructure of the working units of the region’s energy sector. In a statement officially pronounced yesterday by the Oil Ministry, Bijan Namdar Zanganeh said that that a possible attack might be launched by the West in retaliation to a drone attack launched on a Saudi company’s oil reserve last week- thus reducing the supply of oil to the world. Paris,...

New Mobile Security alert called WIBattack discovered by Ginno Security

Ginno Security Lab, a China-based Mobile Security service offering company has discovered a new Sim card vulnerability besides the recently discovered SIMJacker cyber threat. The researcher’s claim that a new vulnerability was lurking in the dark which might hit the entire GSM Association at any moment causing serious harm to millions of telecom subscribers worldwide. Technically speaking, the described mobile security threat is in existence since 2015 but was recently discovered when a Cybersecurity firm AdaptiveMobile threw some light on Simjacker...

Saturday, September 28, 2019

Crooks used fake job website to scam jobless US veterans

By Sudais If users who happen to be mostly military veterans, in this case, followed standard principles of double-checking URLs and not downloading files from untrusted sources, they could have remained safe and avoided being the victim. This is a post from HackRead.com Read the original post: Crooks used fake job website to scam jobless US veterans September 29, 2019 at 12:11...

Can banks and fintech bring environmental accountability to their everyday purchasing decisions?

Environmental concerns are an increasingly important issue for people around the world. From cutting back on the amount of plastic being used to taking public transport wherever possible, there’s been a fundamental shift towards more green-conscious habits in many parts of society. Consumers have also come to expect the same standards from businesses, with 81% of people across...

The Four Pillars of CASB: Identity

This post was originally published by Juan Lugo. With cloud being so prevalent, it is inefficient for organizations to not consolidate the existing identity and authentication systems used for internal applications. Consequently, employees will no longer need to memorize multiple passwords for the plethora of applications used in-house by utilizing a single sign-on. With the Bitglass admin platform, you can govern how and where employees can access corporate data. With this tool, organizations can block, allow, coach, or provide immediate...

Glass Class: The ZScaler and Bitglass Integration

This post was originally published by Will Houcheime. With the various tools used in today’s cloud-first world, it could be confusing for organizations to find the correct tools they need to protect sensitive data. In light of this, Bitglass and Zscaler have partnered with each other to provide a solution to create a safe zone for the use of unsanctioned cloud applications. To find out more about how the Bitglass cloud access security broker (CASB) integrates with the Zscaler secure web gateway (SWG), check out our latest Glass...

ATTACKERS ARE TARGETING IT SERVICE PROVIDERS

This post was originally published by (ISC)² Management. IT service providers have recently become a common target of cyber attacks and 11 of them have been compromised since July 2018. Attackers target providers in attempts to gain access to their customers, according to a blog post by Symantec. Read more here: https://blog.isc2.org/isc2_blog/2019/09/attackers-are-targeting-it-service-providers.html Photo:redmondmag.com The post ATTACKERS ARE TARGETING IT SERVICE PROVIDERS appeared first on Cybersecurity Insiders. September...

Friday, September 27, 2019

How Brexit Impacts the Future of Europe’s Cybersecurity Posture

The British parliament has been unable to agree the exit package from the European Union. With the possibility of a “no deal” departure looming, EU leaders have granted a six-month extension to Brexit day. But the uncertainty that still lingers with regards to Britain’s future, creates various opportunities which cyber criminals could try to exploit. Given the situation, careful...

Hacker publishes ‘unpatchable’ permanent jailbreak for iPhone 4s to iPhone X

By Sudais Apple's jailbreak just became easier. This is a post from HackRead.com Read the original post: Hacker publishes ‘unpatchable’ permanent jailbreak for iPhone 4s to iPhone X September 28, 2019 at 02:42...

Thales’ Managed Services Program Honored at MSP Innovation Awards

Thales’ Managed Services program was recognized at the MSP Innovation Awards, powered by Channel Partner Insight (CPI), earlier this summer in New York City. The MSP Innovation Awards are designed to honor the vendors, distributors and MSPs across North America who are leading the way in managed services at a time of unprecedented disruption and change in the channel. With...

Honeywell offers Forge Software for Industrial Cybersecurity environments

Honeywell which is into Commercial and Consumer product production has unveiled a new Forge Software platform to reduce cyber threats to the critical infrastructure of businesses and industries. The software is such that it offers mission-critical Cybersecurity performance across single or multiple sites mitigating risks and improving Cybersecurity management capabilities. Whether it is moving data from one site to another or using operations data to strengthen endpoint and network security, Honeywell’s Forge Software is capable of addressing almost...

Thursday, September 26, 2019

Two Ontario Canada based hospitals hit by Ransomware Attack

Two Ontario based hospital networks were hit by a malware attack early this week locking down their database and offering network issues to staff and patients. The Listowel Wingham Hospital Alliance located in North of Stratford and Wingham Hospital in Northeast Huron County is the victims which have been digitally locked down from access by hackers. Karl Ellis, the President and the CEO of the Canada based hospital issued a press statement yesterday stating that the attack was of ransomware genre and took place on the hospital network during the...

Cyber Attack on Airbus

Airbus which happens to be the second biggest aerospace company in the world was hit by a cyberattack recently. The objective behind the attack was to steal business secrets and some sensitive info about future projects and hackers from China happen to be on suspicion radar. According to the highly placed sources, the attacks took place in segmented style within 12 months and the motive was to steal the technical secrets on aircraft build of the Airbus A350 Passenger Jet and Airbus Military Transport Plane A400M which is touted to have the world’s...

How Gemalto is staying at the forefront of eSIM innovation

Developments in eSIM technology are taking place at a rapid pace as demand for hardware-based applications grow. A new generation of eSIM-ready smartphones support both a removable slot SIM card and eSIM (such as Apple’s ever popular iPhones), and the first eSIM-only smartphones are rumoured to go live in the second half of 2019. This will mark a true disruption for mobile...

Does Jack Dorsey’s Twitter Account hack mean two factor authentication is waste of time?

Is Two Factor Authentication a Waste of Time? Not All MFA Methods are Created Equal Over the past few years, people have been advised to replace the passwords they use to access cloud services, with two-factor authentication or ‘two step verification’. This is because the majority of data breaches to cloud services are the result of compromised passwords. But as evident in the takeover of Jack Dorsey’s Twitter account , the SMS two step verification that was in place for Dorsey’s account, didn’t provide the expected protection and hackers were...

Transforming into Code Signing

How two enterprise transformations are increasing the importance of code signing security Every enterprise understands the need for security, but recent transformations in the business ecosystem are increasing the urgency to implement strong and transparent security processes. At the same time, these transformations are shifting how this security must be delivered. Digital...

Five easy-to-miss Gemalto products that make life easier

As the world becomes ever more reliant on technology, we have become accustomed to new inventions making our lives easier than ever before. As a result, there are many objects you might take for granted on a daily basis but never realized how difficult life would be without them. To show you exactly how easy it is to miss these products we’ve come up with a list of five Gemalto...

Cyber Attack news currently trending on Google

Danish company Demant which is into the manufacturing of Oticon brand hearing aids has released a press statement today stating that it has lost over 500,000 Kroner via a cyber attack early this month. Highly placed sources report that the incident took place on September 3rd disrupting production and distribution servers of Oticon hearing aids. The Denmark based company which is also known as William Demant as per the trade association is reported to have an annual turnover of around 14 billion Kroner and has an employee count of over 14,000 staff...

Information Security Professional Degeneration

By Ian Trump If you ask mid-and-advanced-career information security professionals about their jobs in information security, most of them may not express the kindest sentiments. This is a post from HackRead.com Read the original post: Information Security Professional Degeneration September 24, 2019 at 03:25...

AI Leaps into Banking: When to know You Can Trust It

By Uzair Amir Banking is readily recognized as one of the main sectors undergoing significant transformation with the advent of AI (Artificial Intelligence). This is a post from HackRead.com Read the original post: AI Leaps into Banking: When to know You Can Trust It September 26, 2019 at 03:12...

Wednesday, September 25, 2019

Utmost Mobile Security for low budget phones with Android 10 Go

Google which offered a preview of Android Q in March this year has renamed it as Android 10 and has been testing its beta versions on its home grew Pixel phones. The internet juggernaut and the subsidiary of the Alphabet Inc have now released an Android 10 Go Edition for budget-friendly phones on Wednesday and has announced that the software will not only make mobile phones faster but will also add more security to users. For those phones which are running with a 1.5GB RAM and less memory, Google plans to target them with Android 10 Go Edition....

Microsoft Internet Explorer users are vulnerable to Zero Day flaw

Microsoft is urging its users to install a new security patch for the Internet Explorer Zero-Day flaw which could be anytime exploited by hackers to run malicious code. Security analysts from the American Technology company say that the exploit can trick IE users in clicking on malicious links and might make them visit unsafe web pages.   The Redmond giant specified in its latest statement that flaw affects IE versions 9,10 & 11 and can to lead to real-time attacks with remote code execution threat on the browser’s scripting engine that...

Complying with APRA Prudential Standard CPS 234

Since Australia’s Notifiable Data Breaches (NDB) scheme launched on the 22nd February 2018, the Office of the Australian Information Commissioner (OAIC) noted that there were 964 data breaches1 reported between 1 Apr 2018 and 31 March 2019. This equates to just over 700% increase in data breaches reported compared to the 114 data breaches voluntarily reported in the previous...

Our insights from the latest European Banking Authority’s paper on PSD2 readiness, advances and challenges

The PSD2 directive, a fundamental piece of payments legislation in Europe, is set to introduce security requirements for the initiation and processing of electronic payments and the protection of customers’ financial data, starting in September 2019. Since the European Banking Authority (EBA) published its first paper in June 2018 on exactly what the PSD2 legislation would...