Showing posts with label Cyber Crime. Show all posts
Showing posts with label Cyber Crime. Show all posts

Tuesday, October 12, 2021

White Hats Initiate Cyber Security Plan at ROOTCON15



Ethical #hackers unite against #cyber threats, create roadmap for PH cyber defense | #TpromoCom #CyberDefense #WhiteHats | With cybercrime one of the biggest immediate threats facing companies today, one of the effective yet little-known methods that can counter their assaults is the engagement of white hat or ethical hackers. https://bit.ly/3mPdTBu

This unique strategy was highlighted in ROOTCON15, the longest-running and premier hacking conference in the Philippines, which recently held a webinar where leaders in the field and knowledge partners from the private sector discussed various issues related to cybersecurity for the Philippines as seen from the perspective of white hat hackers.

During the discussion, DevNull, goon at Rootcon, expressed that... 

Bitdefender 2020 728x90


Follow us on Social Media or email us:

Monday, September 20, 2021

DOJ: Former US intel personnel fined $1.68M for providing hacking services to foreign gov

#DOJ: Former US intel personnel fined $1.68M for providing hacking services to foreign gov | #TpromoCom #Hackers #DomesticHacker | The agreement restricts their future activities and employment

The services provided by three U.S. citizens working as senior managers at a United Arab Emirates–based company violated U.S. Export Control and Computer Fraud and Abuse Laws, the DOJ said. 

The three defendants, Marc Baier, 49, and Ryan Adams, 34, and a former U.S. citizen, Daniel Gericke, 40 – all former employees of the U.S. Intelligence Community or the U.S. military – agreed to pay $1,685,000 in penalties as part of a deferred prosecution agreement. (read more)

Call TpromoCom for Content! 330-956-9003 (image)
Call TpromoCom for Content! 330-956-9003




Follow us on Social Media or email us:

Security Magazine: We are at war; a cyber war

We are at war; a cyber war | #TpromoCom | Not only does the quantity of breaches go up, so too does the damage, including monetary loss. In 2021, the IBM Cost of a Data Breach Survey shows a 10% increase in the average total cost. 

The average total cost of a ransomware breach costs $4.62M versus the average data breach of $4.24M.  Attacks come from all over the world. The most significant attacks are those perpetrated by APT's or Advanced Persistent Threats. (read more)



For content, social media, and website
design, call Al Colombo




Follow us on Social Media or email us:

Thursday, July 15, 2021

US Gov Offers $10 Million for Info on Foreign Hackers


US Gov Offers $10 Million for Info on Foreign #Hackers
| #TpromoCom #Hacker #CyberSecurity #Ransomware | The U.S. government has announced new initiatives aimed at combating ransomware and other cyber threats, including a new website and significant rewards for information on foreign hackers (securityweek). https://bit.ly/3B9zAm7

The new website, StopRansomware.gov, is designed to serve as a central hub that consolidates ransomware resources from all government agencies, including CISA, the FBI, the Secret Service, NIST, the Department of Treasury, and the HHS. Its goal is to provide useful resources for individuals, businesses and other organizations.

StopRansomware.gov provides information on what to do if you have been hit by ransomware, avoiding ransomware, and reporting cyber incidents to authorities. It also hosts ransomware alerts and statements from... (read more)






Follow us on Social Media or email us:

Sunday, June 13, 2021

OnDemand | Changing the Entire Paradigm to Cybersecurity

OnDemand | Changing the Entire Paradigm to Cybersecurity | #TpromoCom #CyberSecurity #DataBreach #DataBreachToday | Register for this informative webinar on cybersecurity! https://bit.ly/3iFPspY

Most cybersecurity protections are based on looking for threats. The problem is, malware is evolving at an alarming rate and threat detection solutions, antivirus and EDR can no longer keep up. ThreatLocker CEO, Danny Jenkins will explain how he’s changing the entire approach and paradigm to cybersecurity with a clean and comprehensive approach to ensuring ransomware does not end up in your environment.

Register for this webinar to learn more about:
  • How easily malware can evade antivirus and other threat detection tools. 
  • The latest cybersecurity breaches along with assets and tools you can implement in your business. 
  • How to implement zero-trust security.

To see this presentation: 


Stormin  Protection: The Finest in Power Quality Assurance





Follow us on Social Media or email us:

Saturday, April 10, 2021

Handcuffs Over AI: Solving Security Challenges With Law Enforcement

Handcuffs Over AI: Solving Security Challenges With Law Enforcement
|  #TpromoCom #AI #CyberCrime #Police | We've tried everything else ... now it's time to make the prospect of getting caught -- and punished -- a real deterrent to cybercrime. (DarkReading) https://bit.ly/3t5ZO4x

For those of us who have been dumping budgets and hope into 20 years of broken promises, we find it very difficult to muster any degree of hope in the next round of techno-salvation. 

Five years ago, my suspicion turned to outright rebellious indignation and I started evaluating everything I believed to find a better path to sustainable cybersecurity operations (SecOps). 

To read the remainder of this news story: 





Follow us on Social Media or email us:

Monday, March 29, 2021

So What Makes a Hacker Tick?

Understanding The Psyche Of A Modern-day #Hacker
| #TpromoCom #Hacker #CyberCrime #CyberSecurity | Every cyberattack varies in cause and damage. Despite this, they all contain key components that are applicable to both external and insider threats (informationsecuritybuzz).  
https://bit.ly/3fnBkQk

The tried and tested formula involves cyberattackers finding a way in, navigating the system, extracting information, and then exiting and covering their tracks. Learning these steps to understand the journey cyberattackers take will help you better protect your organisation from these kinds of attacks. 

You can read the reset of this article here: 


Start out taking FREE courses.
Buy a certificate when you pass your final exam!


Follow us on Social Media or email us:

Monday, March 22, 2021

Acer Faced With Ransom Up To $100 Million After Hackers

Acer Faced With Ransom Up To $100 Million After Hackers

Acer Faced With Ransom Up To $100 Million After Hackers | #TpromoCom #Hacker #Ransom #Acer | The REvil ransomware group has claimed yet another high-profile victim. The criminals are demanding a massive $50 million from their latest target: Taiwanese computer manufacturer Acer (Lee Mathews). http://bit.ly/3d28vX3

That’s the discounted rate REvil will accept if Acer agrees to pay quickly, and it’s already believed to be a record sum for ransomware demands. The previous high of $30 million was also linked to a REvil attack. (read more)





Follow us on Social Media or email us:

Wednesday, March 17, 2021

The fire in the OVH datacenter also impacted APTs and cybercrime groups

The fire in the OVH datacenter also impacted APTs and cybercrime groups
| #TpromoCom #Fire #OVH #CyberSecurity | The fire at the OVH datacenter in Strasbourg also impacted the command and control infrastructure used by several nation-state APT groups and cybercrime gangs (securityaffairs)
https://bit.ly/3bYOHVb

OVH, one of the largest hosting providers in the world, has suffered this week a terrible fire that destroyed its data centers located in Strasbourg. The French plant in Strasbourg includes 4 data centers, SBG1, SBG2, SBG3, and SBG4 that were shut down due to the incident, and the fire started in SBG2 one. 

To read the rest of this news story, click here.





Follow us on Social Media or email us:

Monday, February 22, 2021

China Hijacked an NSA Hacking Tool in 2014—and Used It for Years

China Hijacked an NSA Hacking Tool in 2014—and Used It for Years | #TpromoCom #ShadowBrothers #CyberSecurityt #CCP | The #hackers used the agency’s EpMe exploit to attack Windows devices years before the Shadow Brokers leaked the agency’s zero-day arsenal online (wired). http://bit.ly/3aK443b

MORE THAN FOUR years after a mysterious group of hackers known as the Shadow Brokers began wantonly leaking secret NSA hacking tools onto the internet, the question that debacle raised—whether any intelligence agency can prevent its "zero-day" stockpile from falling into the wrong hands—still haunts the security community. 

That wound has now been reopened, with evidence that Chinese hackers obtained and reused another NSA hacking tool years before the Shadow Brokers brought it to light. (read more)

Editorial Comment:
As business people, we must take inventory of our situation in order to take advantage of every advantage. Now that Joe Biden is president, considering his recent comments upselling the value of the CCP to the American way of life, it's more important than ever to remember the things we learned over the past four years concerning China's aspiration for global dominance. We must take this in consideration when making decisions that are integral to the success or failure of our businesses and our nation. --Al Colombo



Follow us on Social Media or email us: