FireSale HackBoy

Knowledge Shared By FireSale HackBoy...

Monday, May 31, 2021

UK NHS to share data causing data privacy concerns among patients

NHS UK has made a public announcement yesterday that it is going to share the data of its patients with third parties that are involved in AI-based research and development programs that benefit the field of Medicine. However, the patients have the option of opting out of this latest update, provided they fill in a form a submit it to their GP Clinic before June 23rd, 2021, respectively.   Thus, going forward, NHS will be sharing the information of its 55 million patients in England who often visit their general practitioner clinic for treatments....

Ransomware Cyber Attack on Canada Post leaks data of 950,000 Customers

A Cyber Attack on one of the technology suppliers to Canada Post has reportedly resulted in the leak of information of more than 950,000 customers. And sources say that the primary postal operator of Canada is taking all Cybersecurity measures to prevent such incidents in the future. And out of an abundance of caution has also informed 44 of its customers about the data breach to prevent any identity frauds in the future.   Cybersecurity Insiders has learned that the impacted company was Commport Communication that provides shipping manifests...

Humach Expresses Concern on New Compliance Vulnerabilities for Remote Contact Centers

PLANO, Texas–(BUSINESS WIRE)–As COVID-19 forced businesses to adapt to the new paradigm of remote work at a breakneck pace, expedited telecommuting transitions exposed new vulnerabilities in contact center compliance, security and privacy, and interoperability. Despite the sudden acceleration of the remote contact center model, Humach, a leading business process and technology...

Microsoft asks all Asian Nations to collectively fight Cyber Threats

Microsoft is urging all APAC nations to collectively fight cyber threats in the region. And to support this objective, the Windows OS software maker has launched an Asia Pacific Public Sector Cyber Security Executive Council(CSEC) constituting 15 policymakers to help APAC nations in sharing threat intelligence, technology, and resources promptly.   Singapore, Korea, Malaysia, Indonesia, Brunei, and Thailand have expressed their pleasure in joining the Asia Pacific CSEC that aims to build a strong communication channel between nations for addressing...

Sunday, May 30, 2021

Suspected Ransomware attack shuts down JBS Meat Processing

Meat processing and distribution came to a standstill due to a cyber attack on the servers of JBS Beef and reports are in that the disruption could cause protein deficiency in countries like Australia, the United States, Canada, and some parts of Europe.   Unconfirmed sources reporting to Cybersecurity Insiders have reported that the attack was of ransomware variant and could take days for the meat processing company to find a resolution.   Australian Meat Industry Employees Union of Queensland have confirmed the news and added that the...

Microsoft warns against the new Russian Cyber Attacks that targeted 150 US firms

A Russian Hacking group dubbed Nobelium has reportedly targeted more than 3000 Exchange Email server accounts from Microsoft operating across 150 US firms says a report released by Tom Burt, Corporate Vice President and Customer Security & Trust, Microsoft.   Microsoft report specifies that the threat actors are showing interest in only government agencies, think tanks, consultants, and NGOs working across North America and in some parts of Europe and have sidelined small and medium scale businesses for now. While the majority of organizations...

Saturday, May 29, 2021

Six Key Characteristics of a Modern ZTNA Solutions

span style="color: #000000;font-size: 11pt;font-family: Calibri, Arial" data-sheets-value="{"1":2,"2":"This post was originally published by ."}" data-sheets-userformat="{"2":10753,"3":{"1":0},"12":0,"14":[null,2,0],"16":11}">This post was originally published by  Jeff Birnbaum. Even as organizations continue adoption of cloud technologies, the need for secure access to on-premises resources has not gone away. In fact, as many companies navigate...

Friday, May 28, 2021

What is data loss prevention?

This article was written by an independent guest author. DLP security strategies, benefits explained The threat landscape is a constantly evolving challenge for enterprise security professionals – the number of cyberattacks is continuing to rise, data exfiltration is now included in 70% of ransomware attacks, and insiders are responsible for 30% of all data breaches. As a...

Teaching kids internet safety tips for Zoom parties

This blog was written by an independent guest blogger. Image Source: Pexels The internet has changed over the years. Kids today are less interested in random chat rooms, and more inclined to connect with their friends via social media. Most recently, Zoom parties have become the norm for kids, especially due to the COVID-19 pandemic. On paper, Zoom parties can be great ways...

Asymmetrical threats in Cybersecurity

Security and defense theory are inextricably entwined. Consider medieval castles. They were designed as a defensive mechanism that provided security to those within, most of whom were simply civilians hiding behind the walls for protection from invaders.  Within cybersecurity, multiple concepts from defense and war theory can be applied to better address the cyber risks...

QuoLab Technologies Recognized for its Commitment to Enhancing Security Operations

COLUMBIA, Md.–(BUSINESS WIRE)–QuoLab Technologies, provider of a data-centric security operations platform (SOP), today announced that it has been named an industry winner in multiple categories as part of the 2021 Cybersecurity Excellence Awards and the 2021 Cyber Defense Magazine Global Infosec Awards. These accolades come as a result of QuoLab’s continued dedication and...

Texas unemployment website hit by identity fraud Cyber Attacks

After making millions by launching unemployment-related identity frauds in states like Florida, Massachusetts, North Carolina, Oklahoma, Rhode Island, Washington, Wyoming, and Hawaii, a hacker gang from Nigeria seems to have diverted their focus to Texas digitally invading the Workforce Commission Website. Furthermore, the hacker’s group started the distribution of a 13-page reference guide in PDF form on WhatsApp where the cybercriminals are seen detailing how to commit fraud and claim job loss benefits from the unemployment websites if in case...

MORE THAN LIKELY, OR LESS THAN PROBABLE: IS A TRULY QUANTITATIVE SECURITY ANALYSIS POSSIBLE?

span style="color: #000000;font-size: 11pt;font-family: Calibri, Arial" data-sheets-value="{"1":2,"2":"This post was originally published by ."}" data-sheets-userformat="{"2":10753,"3":{"1":0},"12":0,"14":[null,2,0],"16":11}">This post was originally published by  (ISC)² Management. The Language of Profit and Loss Security professionals spend a lot of time honing their area of expertise. Your strength could be in packet analysis, or programming…maybe...

HEALTHCARE PRIVACY–BIGGER THAN JUST HIPAA

span style="color: #000000;font-weight: 400;font-size: 11pt;font-family: Calibri, Arial" data-sheets-value="{"1":2,"2":"This post was originally published by ."}" data-sheets-userformat="{"2":10753,"3":{"1":0},"12":0,"14":[null,2,0],"16":11}">This post was originally published by  (ISC)² Management. Security Without Regulatory Muscle As a security practitioner, you may have worked in an industry that was not affected by any regulatory authority. There...

Thursday, May 27, 2021

Microsoft Chief Brad Smith wants AI to be controlled by 2024

Microsoft President Brad Smith has issued a warning against the use of Artificial Intelligence technology and said that if the tech remains uncontrolled, and then it can spell doom on mankind by 2024.   Explaining his viewpoint with an example in an interview with BBC, Smith said that AI is being used by technologists to make predictions and make calls just by analyzing content from huge datasets.    For instance, the latest surveillance program of China came into the media limelight in 2020 where it was learned that the country...

US Fuel companies should report cyberattacks to the government

US Homeland Security has passed out an order that all fuel generation and pipeline companies operating in the country should report cyberattacks to the government as soon as they are impacted. The decision comes after Congress expressed its disappointment on Colonial Pipeline ransomware payment of $4.4m paid to DarkSide ransomware group that reportedly stole over 100GB of data after gaining control of the fuel supplier’s servers just for a time frame of two hours….now that’s interesting….isn’t it? Replacing some of the old rules with the new ones,...

Stories from the SOC -SSH brute force authentication attempt tactic

Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. Executive Summary An SSH Brute Force attack is a form of cybersecurity attack in which an attacker uses trial and error to guess credentials to access a...

Resecurity Named Winner of the Coveted Global InfoSec Awards During RSA Conference 2021

SAN FRANCISCO–(BUSINESS WIRE)–Resecurity is proud to announce they have won the following award(s) from Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine: Cutting Edge in Digital Footprint Security Next-Gen in Third-Party Risk Management (TPRM) Cutting Edge in Threat Intelligence “We’re thrilled to receive one of the most prestigious...

What is a trusted advisor?  …and why do I need one?

Organizations today, even those not related to “tech”, all have a need for cybersecurity. Regardless of your industry vertical, if you have email, a website, a phone system, or even just have people using computers, cybersecurity is needed at some level or another to protect your ability to do business. Strategy first What is your cybersecurity strategy? Every organization...

Ways to setup Squid proxy server and helpful tips

This blog was written by an independent guest blogger. A squid proxy server has two major functions. First, it is an intermediary proxy. Second, it provides cache services for popular network protocols including HTTP and FTP. The use of proxies and cache services makes up a better internet user experience. Proxies provide added layers of security and cache services that make...

It’s Official: (ISC)² Security Congress is Back for the 11th Year in a Row!

Registration for the 11th annual (ISC)² Security Congress is now open! The renowned global three-day conference, focused on continuing education for cybersecurity professionals and information security specialists, will be hosted as a hybrid event for the first time in 2021. Engaging in-person sessions, discussions, and networking events will be held at the Hyatt Regency in...

Japan government servers hacked and data stolen

Fujitsu, an IT services firm from Japan was recently targeted by cybercriminals stealing sensitive data belonging to government offices says a report released by NHK- a Japan-based media resource.   Sources reporting to Cybersecurity Insiders say that the data belonging to the Ministry of Land, Infrastructure, Transport, Cabinet secretariat, and Tourism were accessed & siphoned by hackers.   Reports are in that critical air traffic data belonging to Narita Airport and those belonging to the Land and transport ministry was also accessed...

Wednesday, May 26, 2021

Congress to review Federal Cyber Terrorism Risk Insurance Program

A team of experts from the cyber arm of Congress is busy studying the costs involved when the critical infrastructure is targeted by cyber attacks. The objective is to reassess the coverage provided by the Federal Cyber Terrorism Risk Insurance Program( TRIP) in the event of cyber-terrorist activities on the IT infrastructure hosted by public and private properties In general, TRIP also known as TRIA shares some losses with the private insurance operators when a company covered under the cyber insurance coverage is targeted by certified acts of...

Google to influence doctor decisions in the USA with AI-driven patient data

Google, the technology giant of America has tied up with over 70 hospital networks in America to develop a doctor decision influencing AI by analyzing more than 32 million patient records. A healthcare-based algorithm has been in development since 2018 for which data related to over 32 million patients from different streams has been accessed, stored, and analyzed by the Alphabet Inc subsidiary. The aim is to build a machine learning algorithm that assists doctors in making their decisions over patient’s health in a faster and more precise way. Cybersecurity...

Defending the client-side attack surface

It is strange to think that not that long ago the Internet was a very different place.  A place filled with static text content, marked up in HTML, and served up alongside a few included image files; mostly consumed by a small population of persons with specific interests. Today’s Internet consumer demands a vibrant and responsive user experience customized to their...