Showing posts with label CyberCrime. Show all posts
Showing posts with label CyberCrime. Show all posts

Saturday, April 10, 2021

Handcuffs Over AI: Solving Security Challenges With Law Enforcement

Handcuffs Over AI: Solving Security Challenges With Law Enforcement
|  #TpromoCom #AI #CyberCrime #Police | We've tried everything else ... now it's time to make the prospect of getting caught -- and punished -- a real deterrent to cybercrime. (DarkReading) https://bit.ly/3t5ZO4x

For those of us who have been dumping budgets and hope into 20 years of broken promises, we find it very difficult to muster any degree of hope in the next round of techno-salvation. 

Five years ago, my suspicion turned to outright rebellious indignation and I started evaluating everything I believed to find a better path to sustainable cybersecurity operations (SecOps). 

To read the remainder of this news story: 





Follow us on Social Media or email us:

Friday, April 9, 2021

Well Known Credit Card Company Describes a New Skimming Method

#Visa Describes New #Skimming Attack Tactics | #TpromoCom #CreditCard #Criminals | Cybercriminals Using Web Shells to Control Retailers' Servers (govinfosecurity.com) https://bit.ly/3mywxNu

The web shells enable fraudsters conducting digital skimming attacks on e-commerce sites to establish and maintain access to compromised servers, deploy additional malicious files and payloads, facilitate lateral movement within a victim's network and remotely execute commands, Visa says.

In February, Microsoft reported spotting 140,000 web shells per month on servers from August 2020 to January 2021, which it said is almost twice the number from the same period the year before. These web shells, however, were not being used for retail attacks. (read more)


Direct link to this page: https://bit.ly/3mywxNu


Follow us on Social Media or email us:

Monday, March 29, 2021

Linux Systems in Peril of Hacking Hackers? Find Out Here!

New Bugs Could Let Hackers Bypass Spectre Attack Mitigations On Linux Systems
| #TpromoCom #Hacker #Linux #CyberSecurity | Cybersecurity researchers on Monday disclosed two new vulnerabilities in Linux-based operating systems that, if successfully exploited, could let attackers circumvent mitigations for speculative attacks such as Spectre and obtain sensitive information from kernel memory (thehackernews). https://bit.ly/3fn8fof

Discovered by Piotr Krysiuk of Symantec's Threat Hunter team, the flaws — tracked as CVE-2020-27170 and CVE-2020-27171 (CVSS scores: 5.5) — impact all Linux kernels prior to 5.11.8. Patches for the security issues were released on March 20, with Ubuntu, Debian, and Red Hat deploying fixes for the vulnerabilities in their respective Linux distributions. 

Find out more here: 

Contact TpromoCom for Content, Social Media,
Press Releases, and Web Design services.

Call 330-956-9003



Follow us on Social Media or email us:

So What Makes a Hacker Tick?

Understanding The Psyche Of A Modern-day #Hacker
| #TpromoCom #Hacker #CyberCrime #CyberSecurity | Every cyberattack varies in cause and damage. Despite this, they all contain key components that are applicable to both external and insider threats (informationsecuritybuzz).  
https://bit.ly/3fnBkQk

The tried and tested formula involves cyberattackers finding a way in, navigating the system, extracting information, and then exiting and covering their tracks. Learning these steps to understand the journey cyberattackers take will help you better protect your organisation from these kinds of attacks. 

You can read the reset of this article here: 


Start out taking FREE courses.
Buy a certificate when you pass your final exam!


Follow us on Social Media or email us:

Friday, March 26, 2021

Why It's Important to Take Down Dark Web Sites

The Case for Taking Down Dark Web Sites

Why It's Important to Take Down Dark Web Sites | #TpromoCom #DarkWeb #CyberSecurity #CyberCrime #Hackers | Taking Down Dark Web Sites May Cause Headache for Both the Bad Guys and the Good Guys (Idan Aharonihttps://bit.ly/2QDTO4J

It’s law enforcement’s main goal to apprehend criminals, and considering it takes time to build a case of evidence, dark web boards can be a treasure trove of leads and relevant data for a case, one that keeps growing as criminals post new content. 

It makes sense for them not to touch a board until they are ready to make their move and apprehend the bigger players on a certain site, usually an international operation involving multiple local agencies.

Read more here: 





Follow us on Social Media or email us:

Wednesday, March 17, 2021

The fire in the OVH datacenter also impacted APTs and cybercrime groups

The fire in the OVH datacenter also impacted APTs and cybercrime groups
| #TpromoCom #Fire #OVH #CyberSecurity | The fire at the OVH datacenter in Strasbourg also impacted the command and control infrastructure used by several nation-state APT groups and cybercrime gangs (securityaffairs)
https://bit.ly/3bYOHVb

OVH, one of the largest hosting providers in the world, has suffered this week a terrible fire that destroyed its data centers located in Strasbourg. The French plant in Strasbourg includes 4 data centers, SBG1, SBG2, SBG3, and SBG4 that were shut down due to the incident, and the fire started in SBG2 one. 

To read the rest of this news story, click here.





Follow us on Social Media or email us:

Tuesday, March 16, 2021

Microsoft cyber-attack turns into global crisis


Microsoft cyber-attack turns into global crisis | #TpromoCom #CyberSecurity #CyberAttack | In this edition, we tell you more about the vast cyber-attack on Microsoft Exchange. What started as an alleged state-sponsored attack is quickly becoming a global crisis, claiming at least 60,000 victims worldwide, mainly small and medium-sized businesses (france24). http://bit.ly/2OycsKS

Several days ago, Microsoft was targeted by a massive cyber-attack. Allegedly, it all began as a Chinese state-sponsored espionage attack against specific individuals using vulnerabilities in its email software. But now, it has escalated into a devastating global hacking scheme as criminal groups rush to compromise victims before they have time to secure their systems.

We ask Adrien Gendre, associate director at Vade Secure, to tell us more about the attack and what the hackers are hunting for. (read more)






Follow us on Social Media or email us:

Thursday, February 11, 2021

Cybersecurity expert warns about the dangers of working from home


Cybersecurity expert warns about the dangers of working from home
 | #TpromoCom | Nuclear war would require billions of dollars and years of development. But someone in a basement can pull off a devastating cyberattack that takes down the critical infrastructure for practically nothing (wrcbtv
). https://bit.ly/3a8LKQN

On computer monitors at cybersecurity companies around the country, animated world maps show live cyber-attacks happening around the world. The attacks targeting the United States are often directed at health care systems, government offices, and regular people who are working on their computers. The attacks are often administered through email attachments and links, and websites that contain links to malware. It's easy to look at those animated maps and realize we are at war.

To read the remainder of this informative article: 





Follow us on Social Media or email us:

Wednesday, February 10, 2021

'What nightmares are made of.' Hackers hit Fla. water supply

'What nightmares are made of.' Hackers hit Fla. water supply (image)

'What nightmares are made of.' Hackers hit Fla. water supply | #TpromoCom #WaterSupply #CyberSecurity | A #hacker tried to poison a Florida city's water supply by spiking levels of a dangerous chemical, law enforcement authorities said yesterday (eenews net). https://bit.ly/3tMxVze

The unsuccessful cyberattack Friday on a water treatment plant in Pinellas County — the first documented attempt to hack into and contaminate a U.S. community's water supply — raises questions around critical infrastructure security as water and energy utilities move to digitize their operations.

A hacker gained access to a water treatment facility serving around 15,000 people in the city of Oldsmar, changing the levels of sodium hydroxide... 





Follow us on Social Media or email us:

Monday, February 1, 2021

How the Best Hackers Learn Their Craft

How the Best #Hackers Learn Their Craft
 | #TpromoCom #CyberSecurity | Do you want to know how to build a top-ranked competitive hacking team?

It's all about the system. In sports, we understand systems that coaches can use to build a system for identifying talent, recruiting them, training them up, and competing in big games. Learn our proven system for building an elite team of hackers that win DEFCON. It's surprisingly easy, but not what you'd think.

Watch this informative webinar now...





Follow us on Social Media or email us:

Saturday, January 30, 2021

Shadow IoT

Shadow IoT | #TpromoCom #IoT #ShadowIoT #CyberSecurity | A big security problem can become a bigger opportunity for channel pros who can detect, secure, and manage rogue smart devices connected to business networks. https://bit.ly/3tbfBzK (James E. Gaskin

BUSINESSES HAVE STRUGGLED for decades with “shadow IT”—printers, laptops, smartphones, cloud services, and more being installed or subscribed to by users without permission or knowledge of an IT admin. In that same vein, users are now connecting smart devices of various kinds to the corporate network, giving rise to the term “shadow IoT.”

It’s a much bigger problem too, according to Zeus Kerravala, principal analyst at ZK Research, "because the scope has broadened. Things you never would have connected before are now connecting." As an example, he cites the Target breach from a few years ago. "The AC system was compromised, and it was on the same network as the point-of-sale system." When the hackers went through the AC system to the POS server, red flags theoretically should have gone up and the AC system should have been immediately quarantined.

Interested in knowing more about Shadow IoT and how to prevent it? 


Follow us on Social Media or email us: