FireSale HackBoy

Knowledge Shared By FireSale HackBoy...

Tuesday, October 31, 2023

The Evolution of Financial Fraud

By Greg Woolf, CEO of FiVerity The marriage of fraud and artificial intelligence (AI) is lethal. Right now, fraudsters are upping their games, leveraging new and innovative tools such as ChatGPT and Generative AI to wreak havoc on the financial world. Their goal? To create deep-fake personas that look so authentic that financial institutions are granting them loans, allowing them to open accounts, approving transactions, the list goes on. Adding insult to injury, most don’t realize the damage inflicted upon them until it’s too late. This is the...

India witnesses biggest data breach of Aadhaar details via ICMR

Aadhaar, the unique identification number issued to every Indian citizen, has recently made headlines for all the wrong reasons. There are alarming reports suggesting that the personal information of approximately 815 million citizens was illicitly accessed by hackers through the Indian Council of Medical Research (ICMR) website, which maintains records of Covid-19 vaccination details for the public. The ICMR, short for the Indian Council of Medical Research, fell victim to a security breach in September of this year. Allegedly, an actor known...

Monday, October 30, 2023

Ransomware news trending on Google

1.) A ransomware group known as “Play” has recently issued a concerning statement. They have threatened to release the personal details of more than 8,600 Dallas County employees on the dark web unless their ransom demands are met. To add weight to their threat, the hackers have shared several screenshots that display personal information belonging to employees from various county departments. The Play ransomware group is not new to the world of cybercrime and has a history of targeting corporate entities, often demanding large sums of money. In...

Kaspersky Uncovers ‘Operation Triangulation,’ a Threat to iOS Devices

Russian cybersecurity firm Kaspersky has uncovered a new threat called ‘Operation Triangulation,’ revealing that it infects iOS devices, including iPads and iPhones. This revelation came during the Security Analyst Summit (SAS) in Phuket, where Kaspersky also released a technical paper detailing the vulnerability that online criminals may have already exploited. For a long time, it was widely believed that Apple devices were impervious to breaches by criminals. However, it has now come to light that threat actors can gain control over the physical...

LockBit Ransomware Group Targets Boeing with Data Threat

LockBit, a notorious ransomware gang, has recently set its sights on the aerospace giant Boeing, initiating a double extortion attack and threatening to unveil stolen data on or after November 2, 2023. In a brazen move, the criminal group has publicly disclosed that they’ve gained access to sensitive company information and are prepared to auction off this valuable data unless Boeing’s IT department complies with their demand for a multimillion-dollar ransom. According to the United States Cybersecurity and Infrastructure Security Agency (CISA),...

Sunday, October 29, 2023

Email Security in the Remote Work Era

“Is your email safe? Think again.” Every day, we send and receive over 333 billion emails worldwide, with the average employee managing 120 of them daily. But, did you know that 94% of cyberattacks start with a malicious email? In 2022 alone, cybercrime cost businesses more than €9.6 Billion, with business email compromise taking the lion’s share of the damage. Don’t become an example! As a result, we’ll delve deep into the most recent developments in email security. We’ll look at the most recent technologies and approaches for keeping emails secure....

Friday, October 27, 2023

Five Canada Hospitals hit by cyber attack, ransomware suspected

Transform, a prominent IT, accounts, and managed service provider dedicated to providing digital support to over five hospitals in Ontario, Canada, is currently under suspicion of being targeted in a cyber attack. Unconfirmed sources suggest that the hospital services have been disrupted since the beginning of this week, and the recovery process may extend for approximately 10 days. While there has been no official statement regarding the nature of this cyber attack, an unverified source has hinted that it could potentially be a variant of ransomware. The...

Hunter International Ransomware Group hacks plastic surgery clinic

A newly emerging ransomware group, known as Hunter International, has recently targeted a plastic surgeon’s office, raising concerns by threatening to expose sensitive photographs of patients who have undergone facial surgery procedures at the clinic’s branches in Beverly Hills and Dubai. Dr. Jaime Schwartz, the US-based surgeon, has reached out to law enforcement agencies to report the cyber-crime and is offering full cooperation to aid in the pursuit of the criminals. Dr. Schwartz remains resolute in refusing to comply with the ransom demands....

Thursday, October 26, 2023

Ransomware news headlines trending on Google

BHI Energy recently issued a statement revealing that its servers fell victim to a ransomware attack orchestrated by a group known as Akira in June of this year. The breach was not detected until July. The attackers gained unauthorized access to the company’s network by exploiting a vulnerability in a VPN connection, resulting in the exposure of sensitive information belonging to approximately 896 residents of Iowa. The compromised data included a range of personal information such as social security numbers, health records of Iowa citizens, full...

How to craft a password meticulously

In today’s digital landscape, many online service providers offer the convenience of using a single password across multiple services. A prime example of this is Google, which allows users to access various platforms like Gmail, Drive, Google Photos, Maps, Sheets, and more with a single login. In this era of interconnected digital services, the art of creating a strong password has become paramount, as a single misjudgment can expose an innocent online user to potential hacking threats. Here are some valuable tips for crafting a robust and cybersecure...

Wednesday, October 25, 2023

Microsoft invests $5 billion to bolster Cyber Shield of Australia

Australian Prime Minister Anthony Albanese has unveiled Microsoft’s Cyber Shield, a substantial commitment to bolster the nation’s cybersecurity infrastructure with a $5 billion investment. The announcement was made during the Prime Minister’s visit to the Australian embassy in Washington, D.C., with the presence of Brad Smith, the head of the prominent tech company. This substantial investment by Microsoft is slated to take place over the course of five years, focusing on enhancing and implementing cloud technology and artificial intelligence. The...

The Role of FPGAs in Post-Quantum Cryptography and Cyber Resilience

By Mamta Gupta, Director of Security and Communications Segment Marketing, at Lattice The rise of both 5G and the Internet of Things (IoT) has created a complex and highly distributed network of devices that are increasingly vulnerable to cyberattacks. In fact, within this new ecosystem, 83% of businesses have experienced firmware attacks, and some don’t even know that they’ve been targeted. As a result, cybersecurity has become non-negotiable for companies, regardless of the industry. Couple this with the advent of Quantum Computers, which will...

Ten compelling reasons to assert cloud sprawl can lead to cybersecurity concerns

Cloud sprawl can indeed lead to cybersecurity concerns for organizations. Here are ten reasons why: 1.Increased Attack Surface: More cloud resources mean more potential entry points for attackers to exploit, as each resource represents a potential vulnerability. 2. Misconfigurations: With various teams provisioning their own resources, there’s a higher chance of security mis-configurations, such as exposed databases or overly per-missive access controls. 3.Complexity: Managing multiple, independently provisioned cloud resources can lead to a lack...

Amazon Web Services launches European Sovereign Cloud

Amazon Web Services (AWS), the American technology giant, has launched an exclusive European Sovereign Cloud to meet the needs of its European customer base. This new cloud infrastructure will operate independently and is designed to address the evolving concerns regarding data residency and resiliency for AWS customers in the European Union (EU). In simple terms, when data is stored on EU servers, it will be under the control of local employees, mitigating data security and privacy concerns for users. The establishment of the AWS European Sovereign...

Tuesday, October 24, 2023

American healthcare looses $78 billion to ransomware attacks

A recent report by Comparitech reveals that the healthcare sector in the United States has incurred staggering losses of $78 billion due to ransomware attacks. These losses are primarily attributed to the significant downtime experienced by healthcare companies over the past six to seven years, spanning from 2016 to 2023. The comprehensive study conducted by Comparitech on the subject of ransomware sheds light on a concerning trend. During this period, there were over 539 officially reported ransomware incidents that affected a total of 9,860 hospitals...

Why EDRs and other preventative measures cannot stop ransomware

As ransomware attacks continue to increase in frequency and sophistication, organizations are searching for ways to prevent them from occurring. One common approach is to implement Endpoint Detection and Response (EDR) solutions and other preventative measures. While these tools can be effective in many cases, they are not always effective in stopping ransomware attacks. Let’s explore why: Evolving Tactics and Techniques Ransomware attackers are constantly evolving their tactics and techniques to evade detection and bypass security measures....

Vietnam hackers start stealing Facebook Credentials

Facebook, the world’s leading social networking platform, has recently made headlines for all the wrong reasons. The company led by Mark Zuckerberg has found itself in the news due to a troubling trend: it has become a target for cyber criminals hailing from Vietnam, who are utilizing stolen account credentials for various nefarious purposes, including selling them on the black market, identity theft, financial loss, and emotional distress. While Facebook’s customer support teams are tirelessly working to address these issues, the situation is...

Monday, October 23, 2023

The Evolution of Access Control: A Deep Dive with PlainID’s Gal Helemski

Access control is at the heart of IT security, evolving over the years to adapt to the rising challenges and demands of an ever-complex digital landscape. One company at the forefront of this evolution is PlainID. In a recent conversation with Gal Helemski, co-founder and CTO/CPO of PlainID, we discussed the evolution of access control, the role of policy-based access control, and how the current cybersecurity landscape is shaping up. The Evolution of Access Control Access control’s story is one of constant change. From rudimentary methods that...

Insider Threats nurtured for circumnavigating data centers

A few days ago, our Cybersecurity Insiders reported an alarming trend: hackers are actively persuading employees of corporate firms to surrender their login credentials, providing a gateway for unauthorized network access. Now, sources on Telegram are forecasting an escalation in cyberattacks, particularly involving malware and file-encrypting malware. These predictions suggest that criminals will increasingly exploit employee credentials to breach networks. This ominous outlook primarily pertains to data centers responsible for managing, storing,...

How Maritime companies can shield from Ransomware

In today’s digital age, ransomware attacks have become a grave concern for industries across the world. Maritime companies, with their extensive reliance on digital systems and global operations, are no exception. Protecting against ransomware is of utmost importance in safeguarding sensitive information, ensuring smooth operations, and preventing potential financial losses. In this article, we will explore the key strategies and best practices that maritime companies can implement to shield themselves from ransomware attacks. Employee Training...

Top 3 Google trending news headlines related to Cyber Attacks

International Criminal Court suffers espionage related cyber attack The International Criminal Court (ICC) has officially determined that the recent cyberattack on its digital systems, which occurred last month, was an act of espionage with the intent to compromise sensitive court data. Situated in The Hague, the ICC houses a wealth of confidential information, including records of war crimes and details of criminals, making it a valuable target for hackers. The ICC has publicly announced that it is launching an investigation into the September...

Saturday, October 21, 2023

Best practices to protect data in remote work environments

By Allen Drennan, Co-Founder & Principal, Cordoniq Addressing the security challenges associated with remote work is critical for today’s Chief Information Security Officers (CISOs). Along with data breaches and ransomware attacks, another top concern is whether company or customer data or other sensitive information is being shared via remote work environments. Data theft is climbing rapidly. A recent report from Identity Theft Resource Center shows that 2023 is on pace to set a record for the number of data compromises in a year, passing...

The Evolution of Security: From Signatures to Deep Learning

In cybersecurity, the arms race between defenders and attackers never ends. New technologies and strategies are constantly being developed, and the struggle between security measures and hacking techniques persists. In this never ending battle, Carl Froggett, the CIO of cybersecurity vendor Deep Instinct, provides an insightful glimpse into the changing landscape of cyber threats and innovative ways to tackle them. A changing cyber threat landscape According to Froggett, the fundamental issue that many organizations are still grappling with is...

Friday, October 20, 2023

Getting your organisation post-quantum ready

While quantum computing is still very much in its early stages, it’s important that companies are already thinking about this evolving technology – and more importantly implementing and stress testing much needed solutions suitable for a post-quantum world. In this blog series we have already discussed the evolving threat that is quantum computing, the need for Post Quantum Cryptography, and how security standards are evolving. In this final instalment we’ll be looking at the examples of PQC already in development. Thales is actively engaged in...