FireSale HackBoy

Knowledge Shared By FireSale HackBoy...

Friday, September 29, 2023

VMware customers anxious about ransomware threats

VMware has recently made headlines on Google News due to ransomware attacks targeting the company. This development has left its customers feeling uneasy and prompted them to search for alternative products that are more secure. The increasing licensing costs have only intensified the quest for alternative virtualization software. Customers are now grappling with the perception that the expenses associated with VMware outweigh the benefits. In fact, a staggering 77% of respondents have expressed reservations about entering into future agreements...

A Roadmap to Launch Your Career in Network Security

In today’s digital age, the importance of network security has never been greater. With cyber threats evolving at an alarming pace, skilled professionals in the field of network security are in high demand. If you’re interested in protecting critical data, thwarting cyberattacks, and ensuring the integrity of computer networks, a career in network security could be a rewarding and impactful choice. Here’s a roadmap to help you get started: 1. Build a Strong Educational Foundation: •    Earn a Bachelor’s Degree: While not always mandatory,...

Canada govt websites disrupted by Cyber Attacks from India

Numerous government websites in Canada experienced performance issues and error messages due to a cyber-attack orchestrated by the India Cyber Force. Federal intelligence agencies have expressed concerns that these attacks could escalate in severity over the upcoming weeks, coinciding with escalating tensions between the Trudeau and Modi administrations. The genesis of this conflict can be traced back to the Canadian Prime Minister’s allegations against the government led by Shri Narendra Modi. These allegations accused the Modi government of orchestrating...

Thursday, September 28, 2023

Digital identity: Dispelling the myths

Digital identities have had a significant impact on the way we interact, transact, and explore the world around us. However, there is still a limited understanding of what they are and the benefits they have. In our latest piece for Computer Fraud & Security Magazine, we addressed some of the common misunderstandings around digital IDs, and outlined the potential for enhanced security, efficiency, and simplicity across the digital landscape. Here’s a flavour of some of the key takeaways… Anyone can use them – not just digital natives:...

Cyber Attack paralysis IT operations at Volkswagen

Volkswagen (VW) manufacturing operations in Germany faced a significant disruption due to a cyberattack that targeted its IT infrastructure. Suspicions have arisen, pointing towards proactive Russian hackers, possibly in response to Germany’s vocal support for Ukraine and its reduced reliance on oil and energy exports. This incident has raised concerns about the potential for a Distributed Denial of Service (DDoS) attack in the near future. According to the business publication Handelsblatt, the cyberattack has had a noticeable impact on car production,...

Wednesday, September 27, 2023

Johnson Controls hit by Dark Angels Ransomware

The Dark Angels ransomware gang, active since May 2022, has reportedly set its sights on VMware ESXi servers within the premises of Johnson Controls International (JCI). The cyberattack initially targeted JCI’s Asian offices and subsequently spread to several subsidiary brands, including York, Tyco, Luxaire, Coleman, Ruskin, Grinnel, and Simplex. Johnson Controls, a renowned manufacturer of industrial equipment such as fire safety and security systems, has launched an investigation into the extent of the attack’s impact on its network. The company...

Lawsuit against MGM and Ceasars Entertainment Ransomware Attack

A lawsuit has been initiated against two prominent gaming entities due to their failure to safeguard the personal identifiable information of their customers, resulting in a substantial potential penalty, possibly amounting to millions of dollars. The legal action revolves around MGM Resorts International and Caesars Entertainment, both of which fell victim to a highly sophisticated file-encrypting malware attack towards the end of last week. Currently, it has come to light that two separate lawsuits have been filed in connection with the MGM cyber-attack,...

Cyber Attacks Arising from Microsoft Office Software

In today’s digital age, Microsoft Office has become a staple in offices and homes worldwide, facilitating communication, productivity, and document management. However, this widespread usage has also made MS Office software a prime target for cyber-criminals. Cyber attacks arising from Microsoft Office software have gained prominence in recent years, posing significant threats to individuals, organizations, and governments alike. This article delves into the evolving landscape of cyber attacks associated with MS Office software and explores ways...

Indian government reports Security Vulnerabilities in Apple devices

The Indian government has released a report highlighting security vulnerabilities in Apple devices. The Computer Emergency Response Team of India (CERT-IN) has issued an urgent alert, identifying security threats affecting a range of Apple products, including iPhones, iPads, Apple Watches, iMacs, MacBooks, and the Safari Browser. These vulnerabilities stem from software flaws. CERT-IN, operating under the Ministry of Electronics and Information Technology (MeitY), previously exposed vulnerabilities in the Google Android Operating System. On CERT-India’s...

Tuesday, September 26, 2023

Top 3 Priorities for Today’s CISO: Safeguarding the Digital Frontier

Jaye Tillson, Field CTO at Axis Security In an era where cyber threats are evolving at an alarming pace, the role of a Chief Information Security Officer (CISO) has never been more critical. Today, CISOs are the guardians of an organization’s digital assets, and in this role are facing a very daunting task–they are being called to protect sensitive data, maintain customer trust, and ensure business continuity. With an ever-expanding threat landscape, the ability to deliver on these three fronts has never been more challenging. As a result, it’s...

Top Five Steps to Elevate Your Data Security Posture Management and Secure Your Data

By Karthik Krishnan, CEO of Concentric.ai October is Cybersecurity Awareness Month, and every year most tips for security hygiene and staying safe have not changed. We’ve seen them all – use strong passwords, deploy multi-factor authentication (MFA), be vigilant to spot phishing attacks, regularly update software and patch your systems. These are great recommended ongoing tips and are as relevant today as they’ve ever been. But times have changed and these best practices can no longer be the bare minimum. The sheer number of threats to your data...

Obtain career boost in 2024 with these 10 cybersecurity certifications

The software industry is in a constant state of flux, and staying competitive requires continuous skill enhancement through the acquisition of the latest and most sought-after certifications. To elevate your career prospects in 2024, consider pursuing one or more of the following certifications, ensuring your pay scale continues to rise: 1.) Systems Security Certified Practitioner (SSCP): This certification validates your advanced technical skills in monitoring and administering an organization’s IT infrastructure. ISC2 issues this intermediate-level...

Email inboxes are vulnerable to sophistication driven cyber attacks

In today’s digital world of communication, a vast amount of information is stored and processed through email communication. This includes sensitive data related to financial transactions, healthcare, professional endeavors, and personal conversations with loved ones. Consider this scenario: a malicious hacker gains access to email credentials through phishing techniques and subsequently takes control of the victim’s email account. This precarious situation opens the door to a range of potential threats. The hacker can manipulate the email account...

Monday, September 25, 2023

Medusa Ransomware Strikes Philippines’ PhilHealth, Demands $300,000 Ransom

In a recent cyberattack, the Philippine Health Insurance Corporation, commonly known as PhilHealth, fell victim to the notorious Medusa Ransomware. This malevolent intrusion has left the government agency grappling with a demand of $300,000 (equivalent to P 17.038 million) to regain access to their compromised database and ensure the deletion of stolen data residing on their servers. Acknowledging the severity of the situation, the Department of Information and Communications Technology (DICT) of the Philippines has confirmed the authenticity of...

Understanding and Safeguarding against QR Code Phishing Attacks aka Quishing

QR code phishing also known as ‘Quishing’ is a cyberattack that leverages Quick Response (QR) codes to deceive individuals into revealing sensitive information or taking malicious actions. QR codes are two-dimensional barcodes that can store various types of data, including website URLs, contact information, and text. Cyber-criminals use these codes to disguise their malicious intent. Here’s how QR code phishing typically works: Distribution: Attackers distribute QR codes through various means, such as emails, SMS messages, social media, or physical...

Trending Ransomware News headlines on Google

Investigation Deepens into MGM Resorts Hack and Caesars Entertainment Ransomware Attack Recent developments in the ongoing investigation into the MGM Resorts hack and the Caesars Entertainment ransomware attack have shed new light on the culprits behind these cybercrimes. Law enforcement agencies working on the case have revealed that the individuals responsible for these attacks are likely to be between the ages of 17 and 22. This revelation is substantiated by the research findings of Unit 42, the cybersecurity division of Palo Alto Networks. The...

Friday, September 22, 2023

FBI and CISA issue Cyber Alert against Snatch Ransomware

When it comes to the world of cybersecurity, the FBI and CISA have a reputation for issuing timely alerts, especially when the threat severity is high. Their latest warning revolves around the notorious Snatch ransomware-as-a-service gang. In their advisory, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) shed light on Snatch, a ransomware-as-a-service operation that has been active since 2018. Over the years, Snatch has honed in on various sectors, including software, U.S. defense, food,...

Cisco acquires Splunk for $28 billion

Cisco, a prominent player in the networking industry, has recently completed a significant acquisition by purchasing cybersecurity solutions provider Splunk for a substantial sum of $28 billion. This announcement was made public through the company’s PR division, shedding light on the transformative impact this move will have on their threat detection capabilities and revenue growth. Splunk is renowned for its ability to help organizations achieve digital resilience, and Cisco intends to harness the technology acquired from this acquisition to...

Thursday, September 21, 2023

WEBINAR: PCI DSS 4.0 Compliance – Tips and Best Practices to Avoid Last-Minute Panic

Join the webinar ‘PCI DSS 4.0 Compliance – Tips and Best Practices to Avoid Last-Minute Panic‘ live on September 26. While the deadline for compliance with the Payment Card Industry Data Security Standard (PCI DSS) 4.0 requirements isn’t until March 31, 2024, organizations that allow those remaining months to fly by without adequate preparation may face last-minute PCI panic and penalties. The best approach is to steadily reach critical milestones, so you’ll be fully prepared when the deadline arrives. Join Steven Sletten, Principal Systems Engineer...

Bringing Authentication Security Out of the Dark Ages

Cyber threats have grown increasingly sophisticated in recent years, with an expanding attack surface, today’s hybrid work environment and new vulnerabilities introduced by the IoT are a few of the challenges. Despite this evolving landscape, most organizations have yet to modernize their authentication security to effectively prevent password-based attacks and related vulnerabilities. With the most recent DBIR finding that compromised credentials are behind more than 50% of breaches, it’s imperative that companies act now to bolster authentication...

​​​​​​​Beyond the firewall: Navigating SaaS security challenges

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Introduction: In today’s digital age, businesses have witnessed a profound shift in how they operate. Software-as-a-Service (SaaS) solutions have become the backbone of many organizations, offering flexibility and scalability. While firewalls remain an essential part of cybersecurity, securing your digital assets in the SaaS realm is a multifaceted...

Cyber Attack on International Criminal Court for arresting Russia Vladimir Putin

In March of this year, the International Criminal Court (ICC) based in The Hague made headlines by issuing an arrest warrant against Russian President Vladimir Putin. The allegations against Putin revolve around accusations of committing atrocities against innocent Ukrainian citizens under the guise of war. In response to this significant move by the ICC, a group of state-funded cyber-criminals has initiated a series of cyberattacks on the ICC, reportedly with the aim of pilfering sensitive documents. These cyberattacks, which began at the close...

Wednesday, September 20, 2023

T Mobile app customers experience data security concerns

Users of the T-Mobile App have recently encountered an unsettling phenomenon, with their account information displaying the personal data of other users. This concerning breach includes sensitive information such as credit card details, billing history, physical addresses, credit balances, and their affiliations with the telecommunications company. As the issue gained traction, a number of users sought assistance from T-Mobile’s customer service. However, some expressed dissatisfaction with the customer care response and turned to platforms like...

Eco-hacks: The intersection of sustainability and cyber threats

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Environmental sustainability is more important than ever before for organizations across all sectors. Sustainability concerns including geopolitics, future-focused developments, advanced ESG reporting, and building sustainability into supply chains going forward are all significant trends shaping businesses in 2023 and beyond.  While the shift...