FireSale HackBoy

Knowledge Shared By FireSale HackBoy...

Thursday, August 31, 2023

Mobile threat defense or bust

The case for unified endpoint management and mobile threat defense The evolution of endpoint management Unified endpoint management (UEM) has played a significant role over the years in enabling companies to improve the productivity and security of their corporate mobile devices and applications. In the early days of endpoint management there were separate workflows and products as it pertains to traditional endpoints, such as desktops and laptops, versus mobile devices. Over time, administrators grew frustrated with the number of tools they were...

Battling malware in the industrial supply chain

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Here’s how organizations can eliminate content-based malware in ICS/OT supply chains. As the Industrial Internet of Things (IIoT) landscape expands, ICS and OT networks are more connected than ever to various enterprise systems and cloud services. This new level of connectivity, while offering benefits, also paves the way for targeted and supply chain...

Deploying AI Code: Safety Goggles Needed

Pieter Adieux Co-Founder and CEO, Secure Code Warrior The possibilities of generative AI (GAI) technology have had both developers and non-developers wide-eyed with excitement, particularly around automation, productivity and business development. What makes it so engaging is that it’s clearly more than just hype: Developers are finding real use cases for GAI, signaling the likelihood that it will become an everyday tool in most roles before long. However, the free rein some developers have been given to test GAI tools has seen many security processes...

LockBit Ransomware targets a province in Quebec Canada

The historical Municipality of Montreal, situated in Canada, has fallen victim to the LockBit Ransomware, an event that underscores the increasing menace of cyber threats. This century-old establishment faced a critical juncture as it chose not to comply with the hackers’ ransom demands, leading to the release of a teaser of pilfered information from their servers. The hackers have ominously promised a more comprehensive data dump in the upcoming week. Montreal, the sprawling metropolis in Quebec Province, exhibited resilience by retrieving the...

Wednesday, August 30, 2023

Court asks DPC to reinvestigate massive Google Data Breach

Approximately 3 to 4 years ago, Dr. Johnny Ryan, a senior member of the Irish Council of Civil Liberties (ICCL), initiated a legal case against the Data Protection Commission (DPC) in the high court. He alleged that the DPC had inadequately addressed a significant data breach that occurred on Google’s servers. However, Mr. Justice Garrett Simons rejected the claim, asserting that the DPC was the appropriate entity to investigate any instances of data breach or misuse involving the servers of private American technology firms, such as Google, a...

The SEC demands more transparency about Cybersecurity incidents in public companies

The Securities and Exchange Commission (SEC) has introduced a new rule for public companies that requires them to be more transparent about cybersecurity incidents. The new rule requires companies to disclose any material cybersecurity incidents within four business days of that determination. The disclosure should describe the material aspects of the incident, including the nature of the incident, the impact on the company, and the company’s response. The SEC’s proposed rules include written cybersecurity policies and procedures, IT risk assessments,...

AT&T Cybersecurity wins SC Media Award for Best Threat Intelligence

Today, SC Media announced the winners of its annual cybersecurity awards for excellence and achievements. At AT&T Cybersecurity we are thrilled that AT&T Alien Labs was awarded Best Threat Intelligence in this prestigious competition. The Alien Labs team works closely with the Open Threat Exchange (OTX), an open and free platform that lets security professionals...

Navigating economic uncertainty with managed security services

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Uncertainty looms large on the horizon as businesses deal with the difficulties of a downturn in the economy. Financial limitations, workforce reductions, and rising cyber threats exacerbate the complexity of such times. Organizations must prioritize their core competencies in this constantly changing environment while protecting their valuable assets...

Enhancing Higher Education Security: The Role of Security Service Edge

Jaye Tillson, Field CTO at Axis Security Amidst the ever-evolving terrain of modern information technology, the domain of higher education has emerged as a focal point for malicious activities. Consequently, ensuring the safety and security of students, educators, and intellectual property assets has become a top priority at all levels. Educational institutions find themselves in the crosshairs of escalating cyberattacks. The aftermath of these attacks, characterized by data breaches, has yielded not only the compromise of sensitive information...

Unveiling Network and Security Architectures: SD-WAN, SASE, SSE, and Zero Trust

By Jaye Tillson, Director of Strategy, Axis Security Over the past few years, our world has evolved at a rapid pace. This rapid evolution has given rise to innovative networking and security architectures such as SD-WAN, SASE, SSE, and Zero Trust. These are relatively new architectures (excluding SD-WAN) and I often get asked what are the differences between them and what are their key features so in this article, I will cover my definition of each, and highlight what I believe to be the key features. SD-WAN (Software-Defined Wide Area Network) SD-WAN,...

Barracuda Email Hack leaks government emails in America

China has reportedly focused its efforts on compromising email servers within several American government networks, raising concerns about potential data exploitation. According to findings from Mandiant, a state-sponsored criminal group targeted the Barracuda Email Security Gateway (ESG) between October and December 2022, deploying two variations of malware. The ramifications of these cyberattacks involving the Barracuda email system are presently under investigation, with their full extent yet to be unveiled. However, suspicions point to UNC4841,...

No More Band-Aids: It’s Time for IT and OT Security Convergence

By Sreenivas Gukal, Head of Products, VP of Engineering, and Co-Founder at Acalvio Technologies Enterprises and regulated industries are becoming well aware that their risk management strategy must include cybersecurity for OT (Operational Technology) environments and the convergence of IT and OT isn’t just happening, it has happened. When it comes to OT, there’s a combination of high potential impact to safety and core operations paired with the unfortunately limited focus on IT security in industrial environments: which translates into substantial...

The Latest in Cybersecurity Incidents making to Google Headlines

Collaborative Efforts Dismantle Qakbot Malware’s IT Infrastructure In a significant joint operation, the FBI, in partnership with the Department of Justice and international allies, has successfully taken down the IT infrastructure owned by the Qakbot Malware group. Drawing expertise from cyber law enforcement units in countries including France, the USA, Germany, the Netherlands, Romania, Latvia, and the UK, a coordinated cyber attack was launched against the botnet infrastructure. This operation aimed to disrupt the malicious activities carried...

Tuesday, August 29, 2023

Volatility Workbench: Empowering memory forensics investigations

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Memory forensics plays a crucial role in digital investigations, allowing forensic analysts to extract valuable information from a computer’s volatile memory. Two popular tools...

Mobile threat defense or bust

The case for unified endpoint management and mobile threat defense The evolution of endpoint management Unified endpoint management (UEM) has played a significant role over the years in enabling companies to improve the productivity and security of their corporate mobile devices and applications. In the early days of endpoint management there were separate workflows and products as it pertains to traditional endpoints, such as desktops and laptops, versus mobile devices. Over time, administrators grew frustrated with the number of tools they were...

Battling malware in the industrial supply chain

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Here’s how organizations can eliminate content-based malware in ICS/OT supply chains. As the Industrial Internet of Things (IIoT) landscape expands, ICS and OT networks are more connected than ever to various enterprise systems and cloud services. This new level of connectivity, while offering benefits, also paves the way for targeted and supply chain...

Monday, August 28, 2023

Rackspace spends $10m in ransomware cleanup costs

In November of the previous year, Rackspace, a well-known company providing cloud computing services, fell victim to a cyber-attack orchestrated by the Play Ransomware group. This attack led to a disruption in their email exchange services for a duration of a few weeks. The company’s response to this incident included the release of an earnings presentation that highlighted the considerable financial impact. Approximately $10 million had already been expended on remediation efforts, affecting a substantial customer base of around 30,000 individuals. In...