FireSale HackBoy

Knowledge Shared By FireSale HackBoy...

Wednesday, May 31, 2023

Sharing your business’s data with ChatGPT: How risky is it?

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  As a natural language processing model, ChatGPT – and other similar machine learning-based language models – is trained on huge amounts of textual data. Processing all this data, ChatGPT can produce written responses that sound like they come from a real human being. ChatGPT learns from the data it ingests. If this information includes your sensitive...

Shadow Data Concerns, Public Cloud Breaches Remain Sky-High: Here’s How Organizations Can Protect Themselves

By Andy Smith, Chief Marketing Officer, Laminar The same technologies powering cloud transformation and data democratization are also introducing the greatest risks to data security, data privacy and data governance professionals. Right now, we’re in the midst of cloud data’s Gilded Age. Data scientists and developers are spinning up new datastores in seconds to make data more accessible, do more with data analytics, and better harness its overall value. However, the increasing adoption of cloud data storage technologies, the sheer proliferation...

SeroXen RAT for sale

This blog was jointly written with Alejandro Prada and Ofer Caspi. Executive summary SeroXen is a new Remote Access Trojan (RAT) that showed up in late 2022 and is becoming more popular in 2023. Advertised as a legitimate tool that gives access to your computers undetected, it is being sold for only $30 for a monthly license or $60 for a lifetime bundle, making it accessible. Key...

Solar Panels at Risk of Cyber Attacks, warn Experts

According to experts from Digital Watchdog RDI, solar panels are now vulnerable to cyber attacks, with hackers targeting the vulnerabilities in the inverters that store energy for powering smartphones, laptops, and small electrical gadgets. This conclusion was reached after a comprehensive assessment of inverters from eight different manufacturers, revealing that none of them met even the basic security standards. Norwegian foundation DNV also released a report stating that photovoltaic inverters can be exploited as bots to disrupt power lines,...

Tuesday, May 30, 2023

UberEats to use 2000 AI powered robots for delivery by 2026

Many technologists around the world are arguing that the use of AI technology might spell doom for mankind in the near future. Amidst such concerns of “risk of extinction,” UberEats has made an official statement that it plans to use over 2,000 AI-powered four-wheeled robots for delivery by 2025-26. The delivery service will be available to customers via the app and will initially be restricted to about 16 cities. It will later expand and be offered in other parts of the United States, if all goes well. A robotics firm named “Serve” will be working...

Go Phish: How Attackers Utilize HTML Files to Evade Security

By Motti Elloul, VP Customer Success and Incident Response, Perception Point Email phishing scams are nothing new. But they are growing increasingly prevalent and sophisticated – over 3 billion phishing emails are sent every day, and the tactics used to disguise them are only growing more devious. One case in point: the Incident Response team from our company, Perception Point,...

The Rush to SaaS Modernization Can Result in Reputational Damage

By Hananel Livneh, Head of Product Marketing, Adaptive Shield Successful cyberattacks tend to hit companies with the force of an 80-foot wave. The initial damage is quickly apparent. Like ships that lose railings and experience instability, businesses are immediately faced with lost data, ransom payments, and revenue losses, depending on the nature of the attack. It isn’t until later that the real damage can be assessed. Structural damage to the bow, aft, and bottom of the boat can render the ship unusable. Likewise, the damage to a company’s reputation...

Introduction to the purpose of AWS Transit Gateway

Introduction Today you look at the Global/Multi-site Enterprise Security Architecture of an organization and see a myriad of concerns. Increased levels of complexity, difficulties managing multiple third parties, difficulties implementing consistent levels of security, and so on. This makes it imperative for organizations to identify opportunities to simplify, streamline,...

Things ChatGPT cannot but Google Bard can do

Google has released its new AI chat service dubbed Bard in over 180 countries, with 15 more to follow by the end of next month. Bard is nothing but a Google owned and a sure-shot competitor to Microsoft-owned OpenAI-developed ChatGPT service that can answer anything and everything. But there’s more to the release of the Alphabet Inc. company, and here’s some knowledge to share about it: 1.) ChatGPT offers answers from its own data repository, but Google Bard can offer answers sieved from the internet, giving users a great chance to find relevant...

Monday, May 29, 2023

Cybersecurity news headlines trending on Google

MCNA, also known as Managed Care of North American Dental, has issued a statement on its website regarding a data breach it is currently experiencing, which has compromised the information of over 9 million patients. As the largest government-sponsored health insurance organization, MCNA states that its systems were possibly infiltrated on February 26th, 2023, but the breach was only identified by its IT staff in the first week of March this year. The stolen information includes the full names, addresses, dates of birth (DoBs), contact numbers,...

US Augusta City targeted by BlackByte Ransomware Group

The City of Augusta in the United States has been struggling to regain control of its computer network as hackers spread ransomware, reportedly stealing data and encrypting the database until a ransom is paid. To substantiate their claims, the BlackByte ransomware group, responsible for the incident, has posted 10GB of sample data and threatened to release more if the victim fails to pay the demanded sum. Mayor Garnett Johnson, the head of the city located in Georgia, stated that the attack was indeed a file-encrypting malware and that the staff...

Sunday, May 28, 2023

Now ransomware hackers targeting backups for ransom pay assurance

A new study conducted by Veeam Software claims that hackers have shifted their focus towards backup storage appliances, as they provide assurance that the victim will definitely pay the demanded ransom amount. According to Veeam’s 2023 Ransomware Trends report, one in 7 organizations has been infected with file-encrypting malware in the past year. Out of these organizations, at least 80% were forced to pay a ransom because their backup storage appliances were also encrypted by the malicious software, leaving them no choice but to comply with the...

Unleashing the Power of AI with Caution: Understanding Cybersecurity Risks

Artificial Intelligence (AI) has emerged as a game-changer, revolutionizing industries and transforming the way we live and work. However, as AI continues to advance, it brings with it a new set of cybersecurity risks and challenges. In this blog, we will delve into the potential risks associated with AI and the importance of implementing robust cybersecurity measures to safeguard against these threats.   AI’s Vulnerabilities: AI systems are not immune to vulnerabilities and can be exploited by cybercriminals. One major concern is adversarial...

Friday, May 26, 2023

Insider threat leads to Tesla data breach

A Tesla employee has reportedly stole about 100GB of data related to the automaker and handed it over to a media company, which has now released a portion of the details. According to a German media resource Handelsblatt, the leaked information from the Tesla Files include sensitive details related to 100,000 names of current and former employees including the social security number of Tesla CEO Elon Musk his itinerary for the next few months. It is unclear how the employee got hold of the data and whether he/she was coaxed to do so by the company...

Will AI technology change our lives to good or bad

The impact of AI technology on our lives is a complex and multifaceted topic. It has the potential to bring both positive and negative changes, depending on how it is developed, implemented, and regulated. Here are some key considerations: Positive Impacts Increased Efficiency and Productivity: AI has the potential to automate repetitive tasks, allowing humans to focus on more complex and creative endeavors. This can lead to enhanced productivity and efficiency in various industries. Advancements in Healthcare: AI can aid in the diagnosis and treatment...

Thursday, May 25, 2023

AI demand accelerates NVIDIA market value to $1 trillion

NVIDIA’s market value is set to soar to an impressive $1 trillion by the end of this year, driven by the rising demand for processors in the Artificial Intelligence (AI) technology sector. With sales reaching a record-breaking $11 billion and a remarkable premarket trading value surge of 29% in recent months, NVIDIA owes its success to the immense demand for silicon wafers in the computing market, particularly in the realm of machine learning. Experts in the trading industry anticipate that the Santa Clara-based company will soon join the exclusive...

Happy Mother’s Day! Serving, surviving, and thriving as a mom with a cyber career

Being a mother and working in cybersecurity necessitates unique skillsets. As mothers, we understand time management, communication, and positive reinforcement. We emphasize the value of clear instructions and providing positive reinforcement. Mothers possess the capacity to remain calm and composed in any circumstance, while also possessing the skillset needed to coach, teach, or evaluate a situation. We excel at active listening which gives us an in-depth comprehension of any issue at hand. Ultimately, mothers make invaluable assets to the cybersecurity...