FireSale HackBoy

Knowledge Shared By FireSale HackBoy...

Friday, April 28, 2023

Google bans 173,000 malicious app developers

Google has issued a ban on approximately 173,000 application developers who tried various methods to get their software published on its Play Store. The web search giant has officially confirmed that it has weeded out a large number of bad accounts and has announced that it will raise the bar even further this year. According to a source at the technology giant, the company has taken stringent action against those spreading malware and spying tools under the guise of renowned applications and will no longer accept applications that work under the...

Is mood tracking feature in Apple iOS 17 a privacy concern

Apple Inc’s released products are known for their progressive innovation, and the best example to prove it is the invention of a glass-driven touch screen that was first introduced to the world via the first iPhone in-series and is now a part of every electronic appliance in today’s world. As expected, the next version of iOS 17, which might be unveiled in about a couple of months or so, is also expected to have mind-blowing features, and leaks suggest that it will include a feature that can detect the mood of the user through their texting and...

Thursday, April 27, 2023

Get ready for RSA 2023: Stronger Together

Going to RSA next week? If you don’t know, it’s a huge cybersecurity conference held at Moscone Center in San Francisco, CA. If you’re going, please stop by the AT&T Cybersecurity booth and check us out. It’s at #6245 in the North Hall. Remember to bring a picture ID for RSA check-in, otherwise you’ll have to go back to your hotel and get it. The RSA theme this year is “Stronger Together” which sounds like a great plan to me! The details So, the details: AT&T Cybersecurity will be at RSA Conference 2023 (San Francisco, April 24-27), in...

Intel allows Google to hack its servers

Intel gave permission to Google to hack its servers operating on its new security hardware product dubbed “Trust Domain Extensions” (TDX). According to sources reporting to our cybersecurity insiders, permission to infiltrate its servers was given almost 10 months ago as part of an audit of its infrastructural defense-line. Google Project’s Zero Bug Hunting team states that its researchers found about two significant vulnerabilities, and five of the newly found flaws were being used as proactive measures to strengthen the security of TDX’s defenses. The...

Wednesday, April 26, 2023

LockBit Ransomware Group feels ashamed for the Cyber Attack

LockBit ransomware group that infiltrated the Olympia Community Unit School District 16 a few days ago has issued an unconditional apology for hacking into the servers of innocent school children. The criminal gang also admitted that it feels ashamed of its actions and assured that it will provide a free decryptor to victims who contact them with the decryption ID via the dark web. LockBit 3.0’s remorse comes as a surprise but is not new. The gang has apologized in the past for causing inconvenience to the entire human race during the Covid-19...

Et esse laboriosam At consequatur nemo eum quibusdam voluptatum?

Et esse laboriosam At consequatur nemo eum quibusdam voluptatum?Et esse laboriosam At consequatur nemo eum quibusdam voluptatum?Et esse laboriosam At consequatur nemo eum quibusdam voluptatum?Et esse laboriosam At consequatur nemo eum quibusdam voluptatum?Et esse laboriosam At consequatur nemo eum quibusdam voluptatum?Et esse laboriosam At consequatur nemo eum quibusdam voluptatum?Et esse laboriosam At consequatur nemo eum quibusdam voluptatum?Et esse laboriosam At consequatur nemo eum quibusdam voluptatum?Et esse laboriosam At consequatur nemo...

The Cybersecurity Talent Gap – Where do We Go from Here?

By Tanya Freedland, VP of Human Resources and Talent Acquisition, Identiv Currently there are 1 million cybersecurity workers in the U.S., yet there are still upwards of 700,000 positions in the field that need to be filled immediately. As the number of job openings in cybersecurity continues to multiply, cyber attacks are growing at an exponential rate, putting the infrastructure of the entire world at risk. The infrastructure of every critical resource on the planet is run using digital technology: healthcare, commerce, energy, government, transportation,...

F-Secure to acquire Lookout Mobile Security

F-Secure has made an official announcement that it is going to acquire the mobile security business of Lookout, and the deal might be completed by June of this year. Although the financial terms are yet to be disclosed on an official note, unconfirmed sources state that the deal is to be valued at $224 million, all in cash. Lookout, which established itself in business in 2009, offers Mobile Endpoint Security solutions with millions of users and hundreds of millions in funding. It offers security products for the consumer market, including antivirus...

Quad nations unite to fight Cyber Attacks on Critical Public Infrastructure

The Quad nations comprising India, Japan, Australia, and the United States will reach an agreement on how to create a collective approach to blocking cyber attacks on critical public infrastructure, such as the power and communication sectors. The Quad countries have devised a plan to meet next month in Australia to reach an agreement on how to involve, deal with, and address state-funded attacks on national infrastructure. Nowadays, every nation wants to target their adversaries on a digital note, and that can only be done by launching invasions...

Tuesday, April 25, 2023

Guidance on network and data flow diagrams for PCI DSS compliance

This is the third blog in the series focused on PCI DSS, written by an AT&T Cybersecurity consultant. See the first blog relating to IAM and PCI DSS here. See the second blog on PCI DSS reporting details to ensure when contracting quarterly CDE tests here. PCI DSS requires that an “entity” have up to date cardholder data (CHD) flow and networking diagrams to show the networks that CHD travels over. Googling “enterprise network diagram examples” and “enterprise data flow diagram examples” gets several different examples for diagrams which...

New SLP Vulnerability to play catalyst to 2000x DDoS attacks

A DDoS Attack is the bombardment of fake internet traffic onto an application server, thus disrupting its operations, leading to its unavailability to genuine traffic. Now, imagine what will happen if the intensity of such attacks increases by 2000 times if/when hackers exploit a vulnerability to amplify the attack resulting in a high scale denial of service attack. Assigned with an ID tag of CVE- 2023-29552, the flaw if exploited can impact over 2,000 organizations and can spill data from over 54,000 SLP instances…. now that’s interesting! These...

Cyber Attack news headlines trending on Google

Yellow Pages Canada reportedly fell victim to a Black Basta Ransomware attack at the end of March this year. News has emerged that the criminals siphoned sensitive details and data from the servers of the Canadian Directory services provider, including information such as tax documents, sales and purchase deals, spreadsheets related to the accounts department, and many scanned passport and driving license documents related to customers and employees. Franco Sciannamblo, the VP and CFO of the company, confirmed the news and assured that more details...

Monday, April 24, 2023

How to establish network security for your hybrid workplace

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  The global COVID-19 pandemic has left lasting effects on the workplace across all sectors. With so many people required to stay home, businesses in every field turned to remote work to open new possibilities for staying connected across distances. Now that the pandemic has largely subsided, many working environments have transitioned into a new hybrid...

SSD with in-built ransomware prevention capabilities

Can you imagine Hard Disk Drives (HDD) and Solid-State Disks (SSD) being immune to ransomware attacks? Well, a company named Cigent says so! It claims to have produced the first SSD with built-in ransomware protection, thus saving users from having their information stolen and encrypted with malware. The Cigent Secure SSD+ has a built-in processor powered by AI machine learning tools that blocks ransomware activity at its core. Its software can detect illegal disk accesses that lead to ransomware spread. Cigent assures that its new storage solution...

Lung Cancer detection possible 10 Years prior with AI

Lung cancer is a dangerous and contagious disease that spreads throughout the body quickly and is not easy to detect in its early stages. However, thanks to the technology of artificial intelligence-enabled machine learning tools, detecting lung cancer is now possible almost 10 years before its onset. Dubbed as ‘CanPredict’, the AI program helps high-risk patients receive appropriate treatment before the disease becomes deadly. Developed by scientists at the University of Oxford, in association with some professors from the University of Nottingham,...

Friday, April 21, 2023

SSE Decoded: Answers to Your Questions About Secure Service Edge

Secure Service Edge works with a variety of network configurations. Is it right for yours? By Chris Alberding & Evin Safdia On the heels of another record number of cyberattacks in 2022, including an alarming 13% increase in ransomware attacks, according to a Verizon year-end report, shielding an organization from this very real and escalating risk requires protective measures that work across network configurations out to the network edge, even as the contours of that edge shift. It takes defenses that are as sophisticated, persistent,...

Indian ICICI Bank data breach exposes 3.8 million customer information

ICICI Bank, an Indian bank with a business presence in over 15 countries, has become a victim of a data breach, leaking information of more than 3.8 million customers or 38 lakh customers. The banking giant says that the news of the data breach is false, as its preliminary inquiries have revealed that the available information on the web is fake and doesn’t belong to its customers. However, the multinational Indian bank is still investigating the incident and may take at least 48 hours to offer confirmed details on the customer info leak. According...

Is Twitter Blue Tick removal a data security concern

A few years back, many people started creating fake twitter profiles to propagate fake news and to indulge in an other kind of online crimes. Later Twitter, that is now owned by Elon Musk, took stringent steps to curb the rise of fake profiles by issuing a “Verified Blue Tick” mark to all those profiles that were being created by a company, individual, group or a country. In March this year, the Tesla Chief made it official that all the blue tick owners need to pay a premium to say to the world that they are still holding an authentic account....

Thursday, April 20, 2023

How Can You Identify and Prevent Insider Threats?

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  If cyber threats feel like faceless intruders, you’re only considering a fraction of the risk. Insider threats pose a challenge for organizations, often catching them by surprise as they focus on securing the perimeter. There is a bright side, however. Understanding the threat landscape and developing a security plan will help you to mitigate risk...

The Double-edged Sword of Hybrid Work

By Mishel Mejibovski, Head of Operations and Strategy, SURF Security While some companies insist on going back to their original work practices and are forcing their employees back into the office, many others have realized the benefits of hybrid work models and have adopted them as their new way of operations. As this trend continues to grow, it inevitably forces companies to invest more resources in end-user security; According to Gartner, spending on security and risk management products and services will grow by 11.3 percent in 2023, reaching...

Cost of state cyber attacks not to be covered under insurance says Lloyd

Bank of America has expressed its concerns over Lloyd’s recent policy decision to exclude cyber insurance coverage for large corporations hit by cyber attacks funded by adversary states. The decision to exclude such attacks from standard insurance policies is tentative, but the London-based insurance firm is sure that recent developments, such as the 2017 NotPetya attack on the NHS, have made it think twice about including the costs incurred through such incidents under general cyber insurance coverage. It is still unclear whether the company plans...

Pillars of Threat Blocking-as-a-Service

By Pat McGarry, CTO of ThreatBlockr There are two indisputable facts about the cybersecurity industry right now. One, we are still in the middle of a massive staffing crisis. Two, one of the biggest drivers of this staffing crisis is burnout of security professionals. A recent study indicates up to 84% of cybersecurity professionals are experiencing burnout. Personally, I was surprised that number wasn’t closer to 100, given what these men and women face on a day-to-day basis. The past three years have been the gift that keeps on giving to threat...

Trending Google news headlines on Ransomware, Penalties and Espionage

1.) AhnLab, a South Korean cybersecurity firm, has issued an alert about a ransomware attack on Microsoft SQL Servers that are being bombarded with Trigona Ransomware payloads meant to encrypt files after stealing data. Hackers induce the same ransomware via brute force or dictionary attacks, where hackers use easy-to-guess credentials to bypass logins. Trigona was first spotted in October 2022 by MalwareHunterTeam, who analyzed the possibilities and concluded that the malware-spreading gang uses Monero Cryptocurrency from their victims to offer...

Wednesday, April 19, 2023

Facebook introduces new AI model capable of detecting objects in images

Meta, the parent company of Facebook, has introduced a new AI model to the world that can identify objects in an image. The newly developed AI model is known as the “Segment Anything Model” (SAM for short) and can understand objects inside images and videos. The ability to detect specific objects is called segmentation, and Meta seems to be democratizing its AI development for analyzing objects on ocean floors, various underwater photography sceneries, space, and country borders. According to the press release made by Meta last week, the accurate...

Over 25 billion email address and phone numbers available on dark web and Putin hacking British Power Network

Precisely speaking, the heading is related to two different articles with different stories. The first one goes as follows: According to a study conducted by Digital Shadows Photon research team, and their report dubbed “Account Takeover in 2022,” about 25 billion email addresses and phone numbers, along with an equivalent number of credit card details and related logins, are available on the web. Surprisingly, most of the data has been sold and used in multiple cyber attack campaigns, with only a small number of bank account credentials and healthcare...