Showing posts with label Cyber Security. Show all posts
Showing posts with label Cyber Security. Show all posts

Tuesday, October 12, 2021

White Hats Initiate Cyber Security Plan at ROOTCON15



Ethical #hackers unite against #cyber threats, create roadmap for PH cyber defense | #TpromoCom #CyberDefense #WhiteHats | With cybercrime one of the biggest immediate threats facing companies today, one of the effective yet little-known methods that can counter their assaults is the engagement of white hat or ethical hackers. https://bit.ly/3mPdTBu

This unique strategy was highlighted in ROOTCON15, the longest-running and premier hacking conference in the Philippines, which recently held a webinar where leaders in the field and knowledge partners from the private sector discussed various issues related to cybersecurity for the Philippines as seen from the perspective of white hat hackers.

During the discussion, DevNull, goon at Rootcon, expressed that... 

Bitdefender 2020 728x90


Follow us on Social Media or email us:

Monday, September 20, 2021

DOJ: Former US intel personnel fined $1.68M for providing hacking services to foreign gov

#DOJ: Former US intel personnel fined $1.68M for providing hacking services to foreign gov | #TpromoCom #Hackers #DomesticHacker | The agreement restricts their future activities and employment

The services provided by three U.S. citizens working as senior managers at a United Arab Emirates–based company violated U.S. Export Control and Computer Fraud and Abuse Laws, the DOJ said. 

The three defendants, Marc Baier, 49, and Ryan Adams, 34, and a former U.S. citizen, Daniel Gericke, 40 – all former employees of the U.S. Intelligence Community or the U.S. military – agreed to pay $1,685,000 in penalties as part of a deferred prosecution agreement. (read more)

Call TpromoCom for Content! 330-956-9003 (image)
Call TpromoCom for Content! 330-956-9003




Follow us on Social Media or email us:

Security Magazine: We are at war; a cyber war

We are at war; a cyber war | #TpromoCom | Not only does the quantity of breaches go up, so too does the damage, including monetary loss. In 2021, the IBM Cost of a Data Breach Survey shows a 10% increase in the average total cost. 

The average total cost of a ransomware breach costs $4.62M versus the average data breach of $4.24M.  Attacks come from all over the world. The most significant attacks are those perpetrated by APT's or Advanced Persistent Threats. (read more)



For content, social media, and website
design, call Al Colombo




Follow us on Social Media or email us:

Monday, August 30, 2021

Security camera hacking: Here's how to stop it from happening to you

Photo by www.Depositphotos.com (image)

#Security #camera hacking: Here's how to stop it from happening to you
| #TpromoCom #CyberSecurity | #Hackers can compromise your home security and privacy. A few basic measures can make it a lot harder for them. https://bit.ly/3zuuYpH

Last year, an ADT home security customer noticed an unfamiliar email address connected to her home security account, a professionally monitored system that included cameras and other devices inside her home. 

That simple discovery, and her report of it to the company, began to topple a long line of dominoes leading back to a technician who had spied, over the course of four and a half years, on hundreds of customers -- watching them live their private lives, undress and even have sex.

To read the remainder of this news story: 


XS01-WT WiFi Smoke Detector





Follow us on Social Media or email us:

Improve Your Cyber Incident Response | Join Us Sept 15


Security Alert Fatigue
How to Wake Up and Take Back Control of your SOC
Wednesday, September 15, 2021 | 10AM PT / 1PM ET
How to Wake Up and Take Back Control of your #SOC | #TpromoCom #Webinar #CyberSecurity #CyberThreat | Adding new security tools to your SOC toolset may help alert you to the newest cyber threats to your business. However, when a zillion unprioritized alerts hit you in a day, you might start treating them like whack-a-mole or the snooze button on your alarm clock. How can you manage security alerts so they are most meaningful to your business, and act on them in an appropriate, timely manner? https://bit.ly/3kF0Bq8

In this webinar, learn expert tips on how to improve your processes and use orchestration to relieve security alert fatigue, get the most out of your security investments and improve your cyber incident response.

Attend this webinar and you'll:
  • Learn how to manage security alerts in a way that is meaningful to your business
  • Get tips on how to effectively respond to alerts in a timely manner and improve response
  • Find out how to overcome "alert fatigue" with orchestration
  • Walk away with tips to protect your data from suppliers or customers with at-risk systems
  • Walk away with ideas on how to get the most out of your security investments

For more info or to register for this webinar: 


Bitdefender 2020 300x250



Follow us on Social Media or email us:

Tuesday, August 24, 2021

Blockchain for ICT Supply Chain Security: Part 1 – The Enhanced MEID (E-MEID)

Blockchain for ICT Supply Chain Security: Part 1 – The Enhanced MEID (E-MEID)
| #TpromoCom #Hacker #Hackers #CyberSecurity #SupplyChain | This is Part 1 of a 3 Part Series on the Enhanced Mobile Equipment Identifier (E-MEID) and how it can be used to improve ICT Supply Chain Security. https://bit.ly/2WcOgS5

The E-MEID is a tokenized MEID that creates a globally unique, auditable, and verifiable data repository for any physical or virtual asset connected to the wireless network. Part 1,” The Enhanced MEID (E-MEID)”, explains the E-MEID concept.

According to a 2017 Office of Economic Cooperation and Development (OECD) study, the Information Communications Technology (ICT) industry annually sells approximately $140B in counterfeit parts. These sales indicate a supply chain security failure that results in 6.5% of ICT products having counterfeit parts and nearly 20% of mobile phones shipped being fake. As a consequence, our industry... (read  more on LinkedIn) 





Follow us on Social Media or email us:

Monday, August 9, 2021

3 hackers held for hacking Shwapno’s system

3 hackers held for hacking Shwapno’s system Staff Correspondent | Published: 20:27, Aug 08,2021 (image)

3 #hackers held for #hacking Shwapno’s system | #TpromoCom #CyberSecurity #CyberCrime | The police on Saturday night arrested three members of a hackers’ group who hacked the digital system of Shwapno and generated illegal digital vouchers worth Tk 18 lakh, said a press release. https://bit.ly/3CIE97Y

The arrested are M Nasimul Islam, Rehanur Hasan Rashed and Raisul Islam. 

The Dhaka Metropolitan Police’s Counter Terrorism and Transnational Crime Unit chief and additional police commissioner M Asaduzzaman disclosed the information of their arrests at a press conference on Sunday. (read more)





Follow us on Social Media or email us:

Wednesday, July 14, 2021

Chinese Hackers Target Government Entities in Widespread Campaign


Chinese Hackers Target Government Entities in Widespread Campaign
| #TpromoCom #Hacker #Hackers #CyberSecurity #CyberAttack | A newly uncovered advanced persistent threat (APT) campaign is targeting a large number of users in South Asia, including government entities, according to a new report from anti-malware vendor Kaspersky (securityweek). https://bit.ly/3B2GZnp

Dubbed LuminousMoth, the activity involves cyberespionage attacks on governments since at least October 2020 but, unlike similar attacks that are highly targeted, this campaign stands out due to its size: roughly 100 victims in Myanmar and 1,400 in the Philippines.

The main focus of the attacks, however, was only a subset of victims that included high-profile organizations, including government entities both within the two countries and abroad. (read more)



Follow us on Social Media or email us:

Sunday, June 13, 2021

OnDemand | Changing the Entire Paradigm to Cybersecurity

OnDemand | Changing the Entire Paradigm to Cybersecurity | #TpromoCom #CyberSecurity #DataBreach #DataBreachToday | Register for this informative webinar on cybersecurity! https://bit.ly/3iFPspY

Most cybersecurity protections are based on looking for threats. The problem is, malware is evolving at an alarming rate and threat detection solutions, antivirus and EDR can no longer keep up. ThreatLocker CEO, Danny Jenkins will explain how he’s changing the entire approach and paradigm to cybersecurity with a clean and comprehensive approach to ensuring ransomware does not end up in your environment.

Register for this webinar to learn more about:
  • How easily malware can evade antivirus and other threat detection tools. 
  • The latest cybersecurity breaches along with assets and tools you can implement in your business. 
  • How to implement zero-trust security.

To see this presentation: 


Stormin  Protection: The Finest in Power Quality Assurance





Follow us on Social Media or email us:

Thursday, April 8, 2021

Isn't it time American Business Owners--Liberals and Conservatives--take National Security more serious?

Isn't it time American Business owners--Liberals and Conservatives--take National Security more serious? | #TpromoCom #NationalSecurity #China #CyberSecurity | I'm especially talking to all of you here in the United States that actually work directly or indirectly for companies owned in part by the Chinese Government. https://bit.ly/3uAfI7O

As a business owner, I understand that for quite some time we've considered business and politics like we might oil and water (they don't mix). However, the politics of any nation has a direct effect on the businesses within it, if not directly, for certain politics can adversely effect business moral and marketing success. 

Here's a  post on LinkedIn that I ran across that leads to additional information that is alarming. It begs to be further researched by every one of us who have businesses to protect, because if the great nation of the United States were to fall victim to the Chinese Communist Party (CCP), we won't have a business to protect, not without great difficulties.  --Al Colombo


Direct link to this page: https://bit.ly/3uAfI7O


Follow us on Social Media or email us: