FireSale HackBoy

Knowledge Shared By FireSale HackBoy...

Sunday, December 31, 2023

Google Play Protect, its Chrome $5 billion lawsuit and replacing 30K jobs with AI

Google, the ubiquitous web search giant deeply ingrained in our daily lives, has unveiled plans to usher in a new era by replacing over 30,000 jobs with Artificial Intelligence (AI) technology. This strategic move aims to enhance operational efficiency and improve customer service on a global scale. Anticipated to roll out by November 2024, this transformative shift towards AI integration is poised to trigger significant workforce changes, resulting in mass layoffs. The revelation surfaced through internal channels within the internet behemoth...

Friday, December 29, 2023

China arrests 4 people who developed ChatGPT based ransomware

Microsoft-owned ChatGPT, developed by OpenAI, remains officially inaccessible in China. However, an intriguing turn of events reveals that hackers within the country have managed to exploit the service through VPNs. These cyber criminals successfully deployed ransomware, encrypting servers within a Hangzhou-based firm in Zhejiang Province. In a surprising twist, China has arrested four individuals linked to this incident. Strikingly, the charges do not pertain to the creation of a file-encrypting malware or the disruption of IT services; rather,...

Thursday, December 28, 2023

Navigating Cloud Security: A Comparative Analysis of IaaS, PaaS, and SaaS

In the era of digital transformation, businesses are increasingly leveraging cloud computing services to enhance agility, scalability, and efficiency. However, the paramount concern for organizations considering a move to the cloud is the security of their data and operations. This article delves into the security aspects of the three primary cloud service models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). I. Infrastructure as a Service (IaaS): IaaS provides the fundamental building blocks...

Beware of this Instagram trend that compromise Data Privacy

In today’s modern era, the concept of privacy in our daily lives seems elusive, given the widespread sharing of personal details on various social media platforms. From Facebook and Instagram to WhatsApp, Twitter, and even the notorious Telegram, users often divulge extensive aspects of their lives, only to later express concerns about privacy. A notable trend on Instagram, a popular platform for sharing photos and videos, is the “Get to Know Me” phenomenon. Users willingly disclose intimate details such as age, phobias, tattoos, piercings, birthmarks,...

Trending Ransomware news headlines on Google

During the holiday season of Christmas 2023, a ransomware attack targeted the Ohio Lottery, causing disruptions to its operations. The gaming company is currently in the process of recovering its encrypted data and is consulting with security experts to expedite the recovery. As a result of the attack, services such as prize and cash claims exceeding $599 are temporarily unavailable. Customers are advised to use alternative digital channels to access their winnings. The newly identified ransomware group, DragonForce, has claimed responsibility...

Wednesday, December 27, 2023

Vietnam hacked CCTV videos selling like hotcakes on Telegram

The Telegram messaging app has emerged as a hub for criminal activities, serving as a platform for data exchange among various illicit networks. Criminals, ranging from drug and child traffickers to cybercriminals, are increasingly utilizing Telegram to facilitate their nefarious operations. One recent instance of cybercrime involves the distribution of hacked intimate CCTV videos, which are being sold on the platform. These videos, featuring content from bedrooms, are in high demand, with a dedicated Telegram channel named Vnexpress offering them...

Ransomware attack leads to identity theft of an Oakland Man

In recent times, we’ve been inundated with countless stories about ransomware attacks and the extortion demands posed by cyber-criminals. However, a new facet of cyber-crime has emerged, taking the form of a twist in the aftermath of a ransomware assault on a government network. A resident of Oakland, Dedrick Warmack, has come forward, alleging that the ransomware attack not only compromised a government network but also resulted in his identity being stolen. This, in turn, paved the way for the creation of fraudulent bank accounts, the acquisition...

Tuesday, December 26, 2023

Remote encryption based ransomware attacks on rise

Over the past year, criminal organizations such as Alphv, LockBit, Akira, Black Basta, and Royal have increasingly engaged in remote encryption attacks. In these cyber assaults, perpetrators target the most vulnerable devices with minimal security, using them as entry points to compromise entire networks. Due to the remote nature of the encryption process, in-house threat detection solutions find it challenging to identify and counteract such attacks. Recognizing the severity of this issue, cybersecurity firm Sophos has classified it as a significant...

China stealing AI feed data from America for Spying

As per a report featured in the Wall Street Journal, there has been a notable surge in China’s illicit acquisition of extensive datasets designated for training Artificial Intelligence (AI) tools in the United States. The apparent objective behind this activity is to conduct mass surveillance on millions of Americans by constructing detailed profiles based on their economic, political, and social inclinations. The article underscores the escalating trend of espionage and substantial data thefts from both American corporations and federal entities...

Monday, December 25, 2023

Ransomware threat rises in November 2023

The month of November 2023 witnessed a surge in ransomware victims, with criminal gangs taking advantage of the holiday season. The combination of a thin IT staff and the Christmas holidays created an opportune environment for companies to fall prey to hackers, especially those lacking in-house cybersecurity solutions to monitor their IT assets. A report from Corvus Insurance revealed alarming statistics for November 2023, indicating a 39.08% increase in new victims compared to October 2023. This spike represented a staggering 100% surge compared...

UK to allow facial recognition on 50m drivers

Britain is poised to conduct facial recognition checks on its 50 million drivers in the upcoming year, with the aim of leveraging this initiative to apprehend criminals based on images captured in the CCTV surveillance database. The Home Office and Driver Vehicle and Licensing Agency (DLVA) have introduced a legal proposal exclusively targeting adults. Chris Phillip, the Minister of State for Crime, expressed that this new law would be a game changer, operating in harmony with existing data privacy laws. The primary focus is to apprehend individuals...

Sunday, December 24, 2023

Safeguarding Your Data: Strategies to Protect Against Information Stealers

In today’s digital age, the security of personal and sensitive information is of utmost importance. Cyber Threats, such as information stealers, pose a significant risk to individuals and businesses alike. Information stealers are malicious software designed to surreptitiously gather and transmit sensitive data, including login credentials, personal details, and financial information. In this article, we will explore effective strategies to protect your data from these insidious threats. 1. Install Reliable Antivirus and Anti-Malware Software:...

Ubisoft ransomware attack gets thwarted

Ubisoft, the France-based video game publisher, recently announced that its in-house threat monitoring software successfully thwarted a ransomware attack that occurred on December 20th of this year. Despite this security success, the company is actively investigating a potential data breach that coincided with the aforementioned attack. An unidentified hacker group exploited this breach by publishing internal software information on VX-Underground. Curiously, this data leak occurred concurrently with a security incident at another company, Insomniac,...

Friday, December 22, 2023

What do CISOs need to know about API security in 2024?

[By Andy Grolnick, CEO, Graylog] In the past couple of years, there has been explosive growth in API usage as API-related solutions have enabled seamless connectivity and interoperability between systems. From facilitating data exchange to cross-platform functionality, companies with an API-first approach have more performant financial outcomes. According to Postman’s 2023 State of the API Report, roughly 66% of participants indicated that their APIs contribute to generating revenue. Among this group, 43% specifically mentioned that...

Thursday, December 21, 2023

First American becomes victim to a ransomware attack

The initial American entity providing title and other insurance services recently experienced a cyber attack believed to be a variant of ransomware. While the insurance company acknowledged service disruptions on its website, it refrained from explicitly stating that the incident involved ransomware, citing ongoing investigations. According to an undisclosed source within the company who spoke anonymously, certain servers were impacted by malware. In a swift response to contain the situation, these affected servers were promptly isolated and taken...

Cybersecurity for Remote Work: Securing Virtual Environments and Endpoints

[By Greg Hatcher, Founder & CEO — White Knight Labs] Remote work surged in popularity out of necessity during the COVID-19 pandemic but seems to be here to stay, thanks to its unique advantages. One study by Upwork estimates that 22% of the American workforce will be working remotely by 2025. However, with the rise in remote work also comes an increase in cybersecurity challenges spurned by the circumstances of remote work. Cybersecurity in an office setting is relatively straightforward, as the IT department can manage a firewall that can...

5 Ways to Conquer Your Certification Exam Fears

“I’ve missed more than 9,000 shots in my career. I’ve lost almost 300 games. Twenty-six times, I’ve been trusted to take the game-winning shot and missed. I’ve failed over and over and over again in my life. And that is why I succeed.” ― Michael Jordan Words of wisdom from the athlete the National Basketball Association calls the greatest basketball player of all time. The fact is, you can’t win if you don’t play. But sometimes the worry of missing that first, second or third shot can keep you from jumping in the game. Don’t let fear hold...

The Cyber Threat Intelligence Paradox – Why too much data can be detrimental and what to do about it

[By Gabi Reish, Chief Business Development and Product Officer, Cybersixgill] In today’s rapidly expanding digital landscape, cybersecurity teams face ever-growing, increasingly sophisticated threats and vulnerabilities. They valiantly try to fight back with advanced threat intelligence, detection, and prevention tools. But many security leaders admit they’re not sure their actions are effective. In a recent survey1, 79 percent of respondents said they make decisions without insights into their adversaries’ actions and intent, and 84 percent of...

Wednesday, December 20, 2023

Ransomware Attacks: Are You Self-Sabotaging?

[By Andy Hill, Executive Vice President, Nexsan] No IT professional is unaware of the staggering risk of ransomware. In 2023, recovering from a ransomware attack cost on average $1.82 million—not including paying any ransom—and some organizations get hit more than once. If you’re hit, you generally have to choose between paying that ransom or restoring your data yourself. Nearly every expert advises you not to pay up, for a variety of reasons, most importantly, the cybercriminal may not honor their promise to release your data. (So much for ‘honor...

To Xfinity’s Breach and Beyond – The Fallout from “CitrixBleed”

On December 18, 2023, Comcast Xfinity filed a notice to the Attorney General of Maine disclosing an exploited vulnerability in one of Xfinity’s software providers, Citrix, that has jeopardized almost 36 million customers’ sensitive information. While the vulnerability was made in August of 2023, the telecommunications solutions provider announced patches in October, but it already had mass exploitation weeks after the patch was reported.    Kiran Chinnagangannagari, CTO, CPO & co-founder, Securin, shares how a vulnerability like...

New to Cybersecurity? Use These Career Hacks to Get a Foot in the Door

The need for cybersecurity professionals has been building for years, and nearly exponentially since COVID came on the scene. At this point, it’s painfully evident there’s a wide talent gap in the field, and research proves it — the global workforce needs an influx of 2.7 million cybersecurity professionals to meet demand.1 In a recent survey of cybersecurity professionals, more than three-quarters said it’s “extremely or somewhat difficult to recruit and hire security professionals.”2 A majority (95%) said the cybersecurity skills shortage and...

7 Cybersecurity Tips for Small Businesses

Keeping customer, employee, and company information secure can mean the difference between staying in business and going under. That’s why the importance of cybersecurity can’t be understated. But exactly how do you keep your systems secure? Here are seven tips that will help you get started. Work With the Right Data Center Having an in-house data center is always an option, but it requires a lot of maintenance. You have to be extremely savvy about security too. Otherwise, it’s only a matter of time before your data is compromised. It’s much easier...

Top 5 Lucrative Careers in Artificial Intelligence

For individuals possessing a professional engineering degree and harboring a passion for artificial intelligence, the most promising career paths of the future await your exploration. This article outlines the top 5 highest-paying careers in the field of Artificial Intelligence to assist you in making informed decisions about your professional trajectory. Data Scientist: Average Salary: $170,600 per year (United States). Essential Skills: Proficiency in programming languages, a strong foundation in mathematics, statistics, and probability. Career...

Tuesday, December 19, 2023

How to retrieve data from google account if user dies

Certainly, dealing with digital assets and accounts after someone passes away can be a complex and sensitive matter. When it comes to retrieving data from a deceased user’s Google account, the process involves several steps and considerations. Google has a process in place for handling the accounts of deceased users, known as the “Inactive Account Manager.” Here’s what you can do: 1.  Set up Inactive Account Manager: Go to the Inactive Account Manager page on Google: https://ift.tt/Xq9H6Fu. Sign in to the Google Account. Follow the instructions...