FireSale HackBoy

Knowledge Shared By FireSale HackBoy...

Friday, February 28, 2025

Belgian Intelligence Agency emails leaked by Barracuda Vulnerability

In recent times, we’ve seen a surge of news stories detailing cyberattacks on various companies, ranging from DDoS attacks to data breaches. However, a new report sheds light on a significant breach involving a Chinese hacking group infiltrating the network of Belgium’s Intelligence and Security Agency (VSSE). The attackers exploited a vulnerability in the firewalls and email security software provided by Barracuda Networks. The State Security Service (VSSE) provided some insight into the incident in a statement to Le Soir, where a spokesperson...

Thursday, February 27, 2025

Cyber Attack news headlines trending on Google

Nearly 2 Million Android TVs Infected with Malware, Triggering Cybercrime Campaigns Cybersecurity firm Xlab has recently reported that nearly 1.59 million Android-based smart TVs have been compromised by Vo1d malware, leading to the formation of a large botnet. This botnet poses a serious risk of triggering a wide-reaching cybercrime campaign in the near future. Xlab’s security experts have stated that the malware’s spread is global, potentially affecting devices in 226 countries. The infection, which initially began with around 50,000 botnets...

How Kyocera’s CISO tackles the threat of cyber risk during AI adoption

Kyocera CISO Andrew Smith explains how he’s responded to the cyber risks associated with AI and how businesses can start implementing it. Ever since AI’s meteoric rise to prominence following the release of ChatGPT in November 2022, the technology has been at the centre of international debate. For every application in healthcare, education, and workplace efficiency, reports of abuse by cybercriminals for phishing campaigns, automating attacks, and ransomware have made mainstream news. Regardless of whether individuals and businesses like it, AI...

SIGNAL denies access to user data in Sweden, reverse of what Apple has done

SIGNAL, the encrypted messaging platform based in California, USA, has made a significant announcement regarding its plans to exit Sweden. The reason for this decision stems from the Swedish government’s demands for access to a backdoor into the platform, allowing it to access user data whenever necessary. This move underscores Signal Messenger’s unwavering commitment to user privacy, signaling to its global user base that it prioritizes the protection of personal data. The company has made it clear that it will not compromise on its promise of...

Wednesday, February 26, 2025

LockBit ransomware gang sends a warning to FBI Director Kash Patel

Recent reports circulating on social media suggest that FBI Director Kash Patel has been targeted by the infamous LockBit ransomware group. According to sources, the gang warned Patel that he is surrounded by subordinates who seem more focused on manipulating narratives and issuing misleading statements rather than performing their duties effectively. In a message that resembles a version originally published on Forbes, the LockBit group first extended their congratulations to Patel for becoming the 9th Director of the Federal Bureau of Investigation....

Personal data of over 3 million US populace leaks in a data breach

Data breaches have become increasingly common in recent years, yet the level of concern surrounding these information leaks has grown significantly. One such breach that has recently come to light involves DISA Global Solutions, a company that provides vital services related to background checks, alcohol testing, and drug diagnostic services. DISA issued a statement revealing that a data breach occurred on one of its servers in April 2024. The breach exposed sensitive data of more than 3.3 million individuals across the United States. This information,...

Fortifying Financial Services Cybersecurity with Threat Intelligence and Cybersecurity Automation

The World Economic Forum’s Global Cybersecurity Outlook 2025 Insight Report paints a bleak picture of what the year ahead holds for technology security  teams worldwide. However, some industries are likely to be worse off than others. The financial sector, for example, is an attractive target for cyber-attacks, as confirmed by Statista which states that the average cost of a data breach in this industry in  2024 was approximately $6.08 million, compared to $4.88 for the overall average cost of a data breach across all industries. As such,...

Tuesday, February 25, 2025

Ransomware hackers are more interested in data exfiltration than encryption

As ransomware attacks gained popularity, hackers initially focused on encrypting entire databases and demanding ransom in exchange for decryption keys. However, recent trends suggest a shift in their tactics, with cybercriminals now more interested in stealing data rather than encrypting it. A report by the American cybersecurity firm ReliaQuest reveals that more malware-spreading gangs are targeting data exfiltration. This method is faster, often taking just 48 to 90 minutes, and carries a lower risk of being traced by law enforcement. In contrast,...

Overcoming Critical AI Security Risks Uncovered in DeepSeek-R1

DeepSeek has taken the AI world by storm, surpassing ChatGPT as the most downloaded smartphone app and gaining rapid adoption due to its efficiency and accessibility. While its advancements in AI reasoning and performance optimization are impressive, security researchers, including our team at Qualys, have uncovered many critical vulnerabilities that raise serious concerns for enterprise adoption. It is vital that organizations prioritize security just as much, if not more than performance when it comes to AI deployment. This piece will dive into...

INE Secures Spot in G2’s 2025 Top 50 Education Software Rankings

Cary, NC, February 25th, 2025, CyberNewsWire  INE, the leading provider of networking and cybersecurity training and certifications, today announced its recognition as an enterprise and small business leader in online course providers and cybersecurity professional development, along with its designation as the recipient of G2’s 2025 Best Software Awards for Education Products. This category of awards ranks the world’s top 50 software education products based on authentic reviews from more than 100 million G2 users.  “We are thrilled...

Monday, February 24, 2025

Google to replace SMS authentication with QR Codes for enhanced Mobile Security

Google is strengthening online security by transitioning from SMS-based authentication codes to more secure QR codes, providing a robust defense against current cyber threats. This shift comes as SMS codes, traditionally used for two-factor authentication (2FA), have proven to be vulnerable to various forms of attacks. SMS authentication has long been a target for cybercriminals due to its susceptibility to phishing schemes and SIM swapping attacks. In SIM swapping, hackers clone a victim’s phone number, gaining unauthorized access to sensitive...

Kaspersky ban across Australia government agencies

In June of last year, under the leadership of then-President Joe Biden, the United States became the first nation to implement a sweeping ban on Kaspersky products and services, prohibiting their use across all federal agencies. This move, driven by concerns about national security, set the stage for other countries to take similar actions.  Most recently, the Australian government followed suit, announcing a ban on Kaspersky’s software in all its federal agencies. This decision was made following an order issued by the Secretary of the Department...

Sunday, February 23, 2025

How Password Managers Enhance Security in Corporate Networks

In the digital age, corporate networks face an ever-growing number of cybersecurity threats, making password management a critical component of an organization’s security strategy. Password managers serve as essential tools for improving security, streamlining access control, and reducing the risks associated with weak or compromised credentials. The Role of Password Managers in Corporate Security A password manager is a software application designed to store and manage passwords securely. It enables users to generate, store, and retrieve complex...

US Satellites enabled with AI Tech to make them immune to Cyber Attacks

China has emerged as one of the primary geopolitical and technological adversaries of the United States, a fact widely acknowledged on the global stage. In its pursuit of dominance, China continuously competes with the West, with the satellite sector being a significant area of contest. Over the past decade, the Xi Jinping-led administration has aggressively invested substantial resources into military research and development, with a strategic focus on satellite technology and defense systems. This investment aims to establish technological superiority...

Friday, February 21, 2025

Harnessing Agentic AI To Supercharge Security Awareness Training

Security awareness training has been steadily gaining traction and momentum as organizations have come to understand that cyberattacks mostly stem from their own employees (e.g., clicking on phishing links, downloading malicious files, failing to use strong passwords). Despite a lot of in-house training, almost half (46%) of employees still continue to struggle with phishing emails.  Common Mistakes That Dampen Security Training Conventional cyber awareness programs may fall short in certain areas. One-size-fits-all: Most training programs...

Apple backs out of offering Data Security tool to UK customers

Apple Inc., renowned for its commitment to data privacy and security, made an unexpected announcement a few hours ago that its Advanced Data Protection (ADP) service will no longer be available for new sign-ups in the United Kingdom. The tech giant also revealed that current users of the service will need to discontinue its use in the coming days. This move follows growing media reports suggesting that the UK government had pressured Apple to provide a backdoor allowing authorities access to the photos, videos, and documents stored on its cloud...

Thursday, February 20, 2025

Genea Australia data breach and Black Basta Ransomware gang data leak

Genea IVF Australia Data Breach: A Detailed Account Genea Australia, a leading fertility service provider and one of the three largest in the country, has confirmed that it has fallen victim to a significant cyberattack, resulting in a data breach. The company has acknowledged the breach publicly and assured that a thorough investigation is currently underway to determine the full extent of the incident. Further details are expected to be disclosed as the investigation progresses. In an official press release dated February 13th of this year, Genea...

AI vs. AI – How Cybercriminals Are Weaponizing Generative AI, and What Security Leaders Must Do

There is a speeding train hurtling down the tracks which is unstoppable, persistent, and accelerating faster than anyone predicted. We all have three choices- be on it, be under it, or stand by and watch it pass us by.  AI and automation are reshaping the battlefield, and cyber criminals are already exploiting these tools to launch attacks at machine speed. From AI-powered phishing and deepfake fraud to autonomous malware that evolves on its own, we are witnessing a new era where traditional security defenses are rapidly becoming obsolete. According...

The Human Factor: How Eliminating Human Vulnerabilities Can Stop Social Engineering Fraud

Fraud is becoming more sophisticated, targeting companies with increased precision, especially in two critical areas: Accounts Payable (AP) and Payment Processes.  Both jobs with vendor-facing roles, these employees are prime targets due to their access to funds and ability to approve or modify payments.   A couple of factors exacerbate the issue. First, these businesses continue to rely on security tools and financial controls that are not only siloed but lack the contextual data needed to detect and prevent these sophisticated...

State of Secure Network Access 2025

Exploring the Future of SASE, SSE, Zero Trust, and Hybrid Security Strategies Overview As organizations continue to manage increasingly sophisticated IT environments and widespread hybrid work models, the demand for secure, scalable network access remains a top priority. This 2025 Secure Network Access Report, based on insights from 411 IT leaders and cybersecurity professionals,...