Showing posts with label Cyber Crime. Show all posts
Showing posts with label Cyber Crime. Show all posts

Monday, November 22, 2021

Top national #security officials stress need for collaboration in #cyberspace

Top national #security officials stress need for collaboration in #cyberspace
| #TpromoCom #NationalSecurity | ABC News went inside the "Battle Bridge" where cyber operations are conducted (abc News). https://bit.ly/3oTWtoe

The United States' adversaries are trying to steal the nation's top secrets, top Cyber Command and National Security Agency officials say, and protecting the American people from these threats takes both the private and public sectors.

"Cybercom's mission is to play the away game and... 

Bitdefender 2020 728x90



Follow us on Social Media or email us:

Monday, November 15, 2021

Open Source Project Aims to Detect Living-Off-the-Land Attacks


Open Source Project Aims to Detect Living-Off-the-Land Attacks
| #TpromoCom #Cyber #CyberSecurity #DarkReading | The machine learning classifier from Adobe can determine whether system commands are malicious and classify them using a variety of tags useful for security analysts. https://bit.ly/3DmQpuw

Call Al Colombo for Content at 330-956-9003. (image)
Call Al Colombo for
Content at 330-956-9003.
Attackers who use standard system commands during a compromise — a technique known as living off the land (LotL) — to avoid detection by defenders and endpoint security software may find their activities in the spotlight if a machine learning project open sourced by software firm Adobe this week bears fruit.

The project, dubbed LotL Classifier, uses supervised learning and an open source dataset of real-world attack to extract features of specific commands and then classifies the command based on a features extracted using human analysis as a model. (read more)

BitDefender Total Security (image)
Get Cyber Secured Today!


Follow us on Social Media or email us:

Tuesday, November 2, 2021

NSA, CISA Weigh in on Cloud Security and the Cyber Dangers Wrought by 5G



Click to read this interesting cyber security story (image)
Click to read this interesting
cyber security story.
NSA, CISA Weigh in on Shared Responsibility for Cloud Security in the 5G Era
| #TpromoCom | Fifth-generation networking is expected to multiply opportunities for hackers using tactics already observed in attacks like the one against IT management firm SolarWinds. https://bit.ly/3bNbgeF

Key federal agencies have released the first in a series of reports detailing their expectations for providers of fifth-generation networking equipment and services which they see increasingly serving as a vector for cyberattacks if they’re not properly secured.

Addressing cloud providers and mobile operators, the National Security Agency and the Cybersecurity and Infrastructure Security Agency said, “5G networks should assign unique identities to all elements (and preferably to each interface) that will communicate to other elements in the 5G network,” for example. (click to read)

Bitdefender 2020 728x90



Follow us on Social Media or email us:

Tuesday, October 12, 2021

White Hats Initiate Cyber Security Plan at ROOTCON15



Ethical #hackers unite against #cyber threats, create roadmap for PH cyber defense | #TpromoCom #CyberDefense #WhiteHats | With cybercrime one of the biggest immediate threats facing companies today, one of the effective yet little-known methods that can counter their assaults is the engagement of white hat or ethical hackers. https://bit.ly/3mPdTBu

This unique strategy was highlighted in ROOTCON15, the longest-running and premier hacking conference in the Philippines, which recently held a webinar where leaders in the field and knowledge partners from the private sector discussed various issues related to cybersecurity for the Philippines as seen from the perspective of white hat hackers.

During the discussion, DevNull, goon at Rootcon, expressed that... 

Bitdefender 2020 728x90


Follow us on Social Media or email us:

Monday, September 20, 2021

DOJ: Former US intel personnel fined $1.68M for providing hacking services to foreign gov

#DOJ: Former US intel personnel fined $1.68M for providing hacking services to foreign gov | #TpromoCom #Hackers #DomesticHacker | The agreement restricts their future activities and employment

The services provided by three U.S. citizens working as senior managers at a United Arab Emirates–based company violated U.S. Export Control and Computer Fraud and Abuse Laws, the DOJ said. 

The three defendants, Marc Baier, 49, and Ryan Adams, 34, and a former U.S. citizen, Daniel Gericke, 40 – all former employees of the U.S. Intelligence Community or the U.S. military – agreed to pay $1,685,000 in penalties as part of a deferred prosecution agreement. (read more)

Call TpromoCom for Content! 330-956-9003 (image)
Call TpromoCom for Content! 330-956-9003




Follow us on Social Media or email us:

Security Magazine: We are at war; a cyber war

We are at war; a cyber war | #TpromoCom | Not only does the quantity of breaches go up, so too does the damage, including monetary loss. In 2021, the IBM Cost of a Data Breach Survey shows a 10% increase in the average total cost. 

The average total cost of a ransomware breach costs $4.62M versus the average data breach of $4.24M.  Attacks come from all over the world. The most significant attacks are those perpetrated by APT's or Advanced Persistent Threats. (read more)



For content, social media, and website
design, call Al Colombo




Follow us on Social Media or email us:

Thursday, July 15, 2021

US Gov Offers $10 Million for Info on Foreign Hackers


US Gov Offers $10 Million for Info on Foreign #Hackers
| #TpromoCom #Hacker #CyberSecurity #Ransomware | The U.S. government has announced new initiatives aimed at combating ransomware and other cyber threats, including a new website and significant rewards for information on foreign hackers (securityweek). https://bit.ly/3B9zAm7

The new website, StopRansomware.gov, is designed to serve as a central hub that consolidates ransomware resources from all government agencies, including CISA, the FBI, the Secret Service, NIST, the Department of Treasury, and the HHS. Its goal is to provide useful resources for individuals, businesses and other organizations.

StopRansomware.gov provides information on what to do if you have been hit by ransomware, avoiding ransomware, and reporting cyber incidents to authorities. It also hosts ransomware alerts and statements from... (read more)






Follow us on Social Media or email us:

Sunday, June 13, 2021

OnDemand | Changing the Entire Paradigm to Cybersecurity

OnDemand | Changing the Entire Paradigm to Cybersecurity | #TpromoCom #CyberSecurity #DataBreach #DataBreachToday | Register for this informative webinar on cybersecurity! https://bit.ly/3iFPspY

Most cybersecurity protections are based on looking for threats. The problem is, malware is evolving at an alarming rate and threat detection solutions, antivirus and EDR can no longer keep up. ThreatLocker CEO, Danny Jenkins will explain how he’s changing the entire approach and paradigm to cybersecurity with a clean and comprehensive approach to ensuring ransomware does not end up in your environment.

Register for this webinar to learn more about:
  • How easily malware can evade antivirus and other threat detection tools. 
  • The latest cybersecurity breaches along with assets and tools you can implement in your business. 
  • How to implement zero-trust security.

To see this presentation: 


Stormin  Protection: The Finest in Power Quality Assurance





Follow us on Social Media or email us:

Saturday, April 10, 2021

Handcuffs Over AI: Solving Security Challenges With Law Enforcement

Handcuffs Over AI: Solving Security Challenges With Law Enforcement
|  #TpromoCom #AI #CyberCrime #Police | We've tried everything else ... now it's time to make the prospect of getting caught -- and punished -- a real deterrent to cybercrime. (DarkReading) https://bit.ly/3t5ZO4x

For those of us who have been dumping budgets and hope into 20 years of broken promises, we find it very difficult to muster any degree of hope in the next round of techno-salvation. 

Five years ago, my suspicion turned to outright rebellious indignation and I started evaluating everything I believed to find a better path to sustainable cybersecurity operations (SecOps). 

To read the remainder of this news story: 





Follow us on Social Media or email us:

Monday, March 29, 2021

So What Makes a Hacker Tick?

Understanding The Psyche Of A Modern-day #Hacker
| #TpromoCom #Hacker #CyberCrime #CyberSecurity | Every cyberattack varies in cause and damage. Despite this, they all contain key components that are applicable to both external and insider threats (informationsecuritybuzz).  
https://bit.ly/3fnBkQk

The tried and tested formula involves cyberattackers finding a way in, navigating the system, extracting information, and then exiting and covering their tracks. Learning these steps to understand the journey cyberattackers take will help you better protect your organisation from these kinds of attacks. 

You can read the reset of this article here: 


Start out taking FREE courses.
Buy a certificate when you pass your final exam!


Follow us on Social Media or email us: