FireSale HackBoy

Knowledge Shared By FireSale HackBoy...

Friday, June 30, 2023

Cybersecurity is not a tool or software piece; is a state of mind: Bridging the gap for career changers

Introduction In recent years, the field of cybersecurity has witnessed a significant influx of professionals from non-Information Technology (IT) backgrounds who are making the leap into this dynamic industry. As a cybersecurity technical developer and instructor, I have had the privilege of delivering many customers in-person and virtual training courses and meeting numerous individuals seeking to transition into cybersecurity from diverse non-IT related fields. I can remember Cindy, a lawyer in a large firm, not really finding fulfillment after...

Turning fridges into SIM cards: An ecological SIM portfolio

This is equivalent to 20,000 tons of polymers – the weight of almost 2 Eiffel towers or 40 Airbus A380s at take-off. Inevitably most of these SIM cards will end up as waste. However, there is another way. In this blog we’ll be looking at the efforts being made to make SIM cards greener. Commitment to going green At Thales we have an unrivalled, ecological SIM portfolio that is aimed at mobile operators looking for sustainable strategies to reduce the environmental impact of their SIM activity, while improving brand awareness in front of their end...

Top five things to do in Amsterdam

Amsterdam, the capital city of Netherlands, is renowned for its artistic heritage and vibrant culture. An amazing blend of old-world charm and contemporary culture, the city offers a plethora of activities for tourists. From history, to art, or dabbling in unique experiences, Amsterdam has something for everyone. Every summer, the city plays host to Money 20/20, the largest global fintech event enabling payments and financial services for connected commerce. We’ll be there this year to talk about our key solutions that are designed to help financial...

Thursday, June 29, 2023

NHS data breach after ransomware attack on University of Manchester

A ransomware attack on University of Manchester (UoM) has led to the data breach of over a million patients related to NHS and the data includes NHS numbers of those who took treat-ment, the first three letters of their postal codes, patients suffering from terror attacks and those seeking treatment for major trauma. The gathered data set was being used for research purposes by some students of the University and unfortunately hackers accessed information from the data set causing embarrassment to the staff of the educational institution. It is...

Blacktail: Unveiling the tactics of a notorious cybercrime group

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  In recent months, a cybercrime group known as Blacktail has begun to make headlines as they continue to target organizations around the globe. The group was first spotted by the...

Stories from the SOC: Fighting back against credential harvesting with ProofPoint

Executive summary Credential harvesting is a technique that hackers use to gain unauthorized access to legitimate credentials using a variety of strategies, tactics, and techniques such as phishing and DNS poisoning. Phishing is the most frequent type of cyber threat and can lead to more harmful attacks such as ransomware and credential harvesting. According to recent research,...

Paracetamol maker Granules India hit by ransomware attack

Granules, the Indian Pharmaceutical company that manufactures Paracetamol has released an official statement that a ransomware attack that targeted its servers last month has resulted in substantial loss of revenue and profitability. As per the details available to our Cybersecurity Insiders, a noted ransomware group targeted Drug maker on May 25th and the information security incident brought in financial loss that could hit the profit margin to a great extent this year. Currently, the production of the drugs is going slow, however, the IT staff...

Wednesday, June 28, 2023

Threat Hunt: KillNets DDoS HEAD Flood Attacks cc.py

Executive Summary Killnet is a hacktivist group based in Russia that has been active since at least 2015. The group is known for launching DDoS attacks on a diverse range of industries, including state and local governments, telecommunications, and defense. Killnet has been linked to several high profile attacks, including distributed denial-of-service (DDoS) attacks against...

Toward a more resilient SOC: the power of machine learning

A way to manage too much data To protect the business, security teams need to be able to detect and respond to threats fast. The problem is the average organization generates massive amounts of data every day. Information floods into the Security Operations Center (SOC) from network tools, security tools, cloud services, threat intelligence feeds, and other sources. Reviewing...

Venn Redefines Remote Work Security with Innovative BYO-PC Solution

When COVID-19 disrupted our work environments and triggered a massive shift to remote work, organizations faced the daunting task of securing corporate data and apps across thousands of disparate locations and devices. Companies, employees, and IT departments were forced to quickly adapt to this new reality of a remote-first world. The issue was further exacerbated by traditional...

Wagner Ransomware targets Russian Computers operating on Windows

After the military group named Wagner took over the supremacy realms from Putin for a brief period in the last weekend, a new ransomware is said to be threatening all Windows machines operating in the Russian federation. Wagner ransomware has started taking down computers operating on Microsoft software and is pleading the victim to join the paramilitary group that is getting ready to take down Shoigu, the military general leading Vladimir Putin army. A note posted on the infected computers urges the victim to stop tolerating the atrocities of...

Tuesday, June 27, 2023

Google AI aggression makes Bernstein research downgrade Alphabet

Google’s AI push in its search engine algorithms has made Bernstein the wealth management company downgrade the technology giant’s parent company Alphabet. Resulting in the value cut of shares by 1.5 percent that will closely mimic in the market performance over outperform results. The reason for the market research company to downgrade the value of the internet juggernaut at the Wall Street stock exchange is the risks involved with the over-indulgence in Artificial Intelligence that might also affect the stocks of Microsoft and Nvidia, as both...

What is NFV

In today’s fast-paced digital landscape, businesses proactively seek innovative ways to optimize their networks, enhance operational efficiency, and reduce costs. Network Functions Virtualization (NFV) emerges as a transformative technology that leads the charge. NFV revolutionizes traditional, hardware-based network functions by converting them into flexible, software-based solutions. Virtual Network Functions (VNFs) can be deployed on commodity servers, cloud infrastructure, or even in data centers, freeing businesses from the constraints of...

Digital dumpster diving: Exploring the intricacies of recycle bin forensics

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  In the vast realm of digital investigations, there exists a fascinating technique known as recycle bin forensics. Delving into the depths of this captivating field unveils a world...

Benefits of Using NFV with SASE

In today’s digital era, businesses actively strive to heighten network agility, boost security, and slash operational costs. Network Function Virtualization (NFV) and Secure Access Service Edge (SASE) stand at the forefront of this revolution, reshaping enterprise networking and security. NFV breathes new life into traditional, hardware-based network functions, turning them into versatile, software-based solutions deployable on virtualized infrastructure. As a result, businesses cut hardware costs, speed up service deployment, and streamline network...

Submarine Cables vulnerable to Cyber Attacks

Most majority of educated individuals are aware that the internet connects people worldwide through underwater cables spanning the depths of the ocean. However, what many fail to realize is that these cables are susceptible to digital attacks that have the potential to trigger global internet disruptions lasting for days or even weeks. A recent study conducted by Record Future sheds light on the fact that geopolitical tensions, such as the ongoing conflicts between China and Taiwan Province, Ukraine and Russia, and the United States and North Korea,...

Monday, June 26, 2023

Mayor candidate slaps Latitude with $1 million lawsuit for data breach

A Mayor candidate of Australia is suing Latitude for not protecting customer details from hackers. As the unsuccessful mayoral candidate was one victim of the data breach, the person is claiming $1 million as damages in the federal court. Shahriar Sean Saffari is the person who launched a legal appeal against the financial services firm of Australia in the court and is seeking a financial compensation for the distress caused to him after the incident. To those uninitiated, Latitude experienced a cyber-attack in March, leading to data steal of its...

Next-Generation Firewalls: A comprehensive guide for network security modernization

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  The terms computer security, information security and cybersecurity were practically non-existent in the 1980s, but believe it or not, firewalls have existed in some form since that time. Over the years, the traditional firewall has transformed to meet the demands of the modern workplace and adapt to an evolving threat landscape.  Next-Generation...