FireSale HackBoy

Knowledge Shared By FireSale HackBoy...

Thursday, September 30, 2021

Beware of the Cyber Scam related to James bond movie No time to Die

Within a few hours of release of the actor Daniel Craig’s movie ‘No time to Die’, Cybersecurity firm Kaspersky has uncovered a cyber scam that has revolved around the long awaited release of the James Bond movie that is the 5th and final installment of a renowned actor as James Bond 007 spy. From the past 7-8 days, few threat actors were seen launching email related cyber attack campaigns that dodged victims by downloading a fake video file pertaining to the leaked copy of No Time to Die. In reality, there is no video file and is instead a malware...

Cybersecurity related Acquisition news trending on Google

First its Akamai Technologies that hit the news headlines for acquiring Israel-based startup Guardicore. The Massachusetts based company has made it official that it has acquired Cloud based Network Segmentation Company Guardicore for a price of $600 million. Guardicore offers a software based tool that limits apps from communicating with each other in cloud. Thus, it helps block ransomware attacks spreading from one app to other. After purchasing the company, Akamai Technologies is planning to beef up its cloud offerings and assist businesses...

Cybersecurity Case Studies at ContentReads

We all know the situation: As we are researching suitable security solutions, we are looking for hands-on examples of their value add in real-world deployments – like case studies that bring these sometimes abstract solutions to life, so we can see how other organizations are using them. When we discovered this content repository for cyber case studies, we knew right away we found something very unique: The library is called ContentReads Cybersecurity (powered by Contentree), and it contains over 4,300 cybersecurity case studies...

Introduction to SAST

This blog was written by an independent guest blogger. DevSecOps means countering threats at all stages of creating a software product. The DevSecOps process is impossible without securing the source code. In this article, I would like to talk about Static Application Security Testing (SAST). As development fluency is growing every year, many companies are introducing DevSecOps. Its main message calls for ensuring continuous safety control at every stage of product creation. At the same time, DevSecOps processes are automated as much as possible. About...

REvil ransomware gang cheat through odious partner programs

Usually we do not encourage such tactics of earning money through cyber frauds. However, in order to warn those interested, we have published this article. The next time if you are thinking to join a ransomware as a service scheme of REvil group to earn some money through extortion or to take vengeance, you better be aware that such schemes will always dupe the partner first and then the victim next. REvil Ransomware group is one such malware spreading gang that offers ransomware on lease and earns profits from its partners who launch a ransomware...

Wednesday, September 29, 2021

All Cyber Attacks in US should be reported within 72 hours

United States Senate has passed on a new resolution if/when approved will make it mandatory for owners of critical infrastructures to report cyber attacks within a time frame of 72 hours. A cyber incident bill dubbed as Defense Authorization Bill was put forward by the leaders of Senate Homeland Security and Governmental Affairs Committee and is waiting for a nod from the senior members of the senate. After the cyber incident notification act was proposed, the Cyber Incident Review Office belonging to CISA was asked to review and submit a report...

iPhone Vulnerability allows hackers to fraudulently make contactless payments

Cybersecurity researchers have found vulnerability on iPhone’s Apple Pay and Visa payments feature that allows hackers to make fraudulent contactless payments without the knowledge of the owner. A video proving this cyber incident is being circulated on the YouTube from the past 2 days and it claims that the cyber crooks can use simple radio equipment to make a payment in ‘express transit mode’, when in fact it is being paid to a nearby card. Security experts from the Birmingham and Surrey Universities were the ones who first discovered the flaw...

D.A. Davidson Releases The Herd 2021 Featuring the Top 100 Privately-held Emerging Technology Companies in the U.S.

NEW YORK–(BUSINESS WIRE)–D.A. Davidson & Co. has released its annual The Herd report featuring the top 100 privately-held technology companies based in the U.S. largely falling within D.A. Davidson core areas of expertise; application software, infrastructure and security software, vertical software and financial technology. These companies were selected based upon growth...

How to shift into a new approach to cybersecurity asset management

This blog was written by an independent guest blogger. The effects of the global pandemic pushed organizations to accelerate their digital transformation strategies. Because of this, companies in all industries were faced with an array of new technologies like cloud and containers that support the shift to edge computing and remote workers. With so much focus on these factors, companies often overlook some of the repercussions that come along with such rapid innovations. One of which is the need for a new approach to asset visibility.  Inventory,...

How Continuous Monitoring is a Driver of Effective Risk Management

Continuous Monitoring (CM) as the ability to maintain ongoing awareness of information security, vulnerabilities, and threats to facilitate risk-based decision making. The ultimate objective of CM is to determine if the security and privacy controls implemented by an organization continue to be effective over time considering the inevitable changes that occur in the environment...

CCSP vs. EXIN Cloud Certifications: What are the Differences?

Worldwide end-user spending on public cloud services is forecast to grow 23.1% in 2021 to total $332.3 billion, up from $270 billion in 2020, according to the latest forecast from Gartner. Spending on cloud management and security services, specifically, is expected to grow 12% in the next year, from approximately $16 billion in 2021 to about $18 billion in 2022. Demand for...

How Will $1.9 Billion for Cybersecurity Protect American Infrastructure?

The U.S. House of Representatives is scheduled to vote on a $1 trillion bipartisan infrastructure bill on September 30, 2021. Back in August, the U.S. Senate passed the bill, which included $1.9 billion for cybersecurity initiatives. According to The Hill, the funds will go toward securing critical infrastructure against attacks, helping vulnerable organizations defend themselves...

CEO of Group IB that prevents ransomware attacks arrested for treason charges

Group IB, a security company from Russia that helps prevent ransomware spread, is in news for wrong reasons. The CEO of the said company Ilya Sachkov was arrested by the intelligence services of Moscow and put in jail for the next two months. Highly placed sources say that the founder of Group IB was arrested on the charges of treason, that is for passing vital information to intelligence services of foreign soil. However, a spokesperson from the company that specialized in preventing cyber crime and ransomware spread said that the arrest of the...

Cyber Attack news headlines trending on Google

London based Giant Group has confirmed that its IT infrastructure was suffering repercussions gained through a cyber attack on September 24th,2021 and all its phone, email and other payroll related servers were facing digital disruption. A statement on this note was posted on the website of GiantPay that confirms that the UK based Payroll firm was hit by a sophisticated attack that is being investigated by the security experts from the International Law Firm Crowell & Morning. NCSC, ICO and the insurers of GiantPay are aware of the incident...

Google hits its own headlines because of privacy issues

Google, the internet juggernaut, is hitting its own news headlines for reasons related to privacy and its newly developed digital advertising system. The California based web search giant is facing a legal trouble with a privacy movement started by Open Web that claims that the tech giant’s new ad policy will restrict open web competition and vitiate fraud detection. A lawsuit has been filed by some advertisers and publishers with the European Union against the decision of Google to replace the third-party cookies with a new ‘Privacy Sandbox. Therefore,...

Tuesday, September 28, 2021

The Bitglass Blog

Is the Federal government ready for Zero Trust?   With President Biden’s executive order on Improving the Nation’s Cybersecurity specifically mentioning Zero Trust, Fed IT leaders have prioritized the implementation of this technology as part of their digital transformation efforts.  Recently, former Transportation Department CIO Ryan Cote joined our very own Ed Lopez on Federal Drive with Tom Temin to share their unique perspectives on how Federal agencies are approaching Zero Trust.  Here are some key quotes from the podcast: The...

Considerations when choosing an XDR solution

Introduction Cybersecurity is a fast-moving space.  In fact, it’s hard to think of a time that security has been moving more quickly. As we continue to move into the cloud, work from home, and otherwise continue the digital transformation of our businesses, additional capabilities are needed as new threats are discovered. One of these needs is greater integration of our...

How can eSIM help overcome the challenges of IoT connectivity activation?

Connected IoT devices and smart solutions are quickly expanding into every industry and aspects of our lives, and the numbers back this up. By 2025, it has been predicted that 75 billion IoT devices will be connected with a potential market value of around $1.6 trillion. With the ability to leverage real-time data and analytics from...

CCSP vs. AWS Cloud Certified: Which One for Cloud Security?

Organizations worldwide are facing new security challenges presented by cloud computing, as most legacy security tools fail to meet the requirements of dynamic, distributed, virtual cloud environments. In fact, 81% of organizations say traditional security solutions don’t work at all in cloud environments or have only limited functionality, according to the 2021 Cloud Security...