Showing posts with label CyberCrime. Show all posts
Showing posts with label CyberCrime. Show all posts

Monday, August 16, 2021

Morse Code Used by Hackers in Phishing Attacks

#Hackers Spotted Using Morse Code in #Phishing Attacks to Evade Detection
| #TpromoCom #CyberSecurity #CyberCrime | Microsoft has disclosed details of an evasive year-long social engineering campaign wherein the operators kept changing their obfuscation and encryption mechanisms every 37 days on average, including relying on Morse code, in an attempt to cover their tracks and surreptitiously harvest user credentials. https://bit.ly/3yNfWed

The phishing attacks take the form of invoice-themed lures mimicking financial-related business transactions, with the emails containing an HTML file ("XLS.HTML"). 

The ultimate objective is to... (read more)

Bitdefender 2020 728x90


Follow us on Social Media or email us:

sm081621A

Monday, August 9, 2021

3 hackers held for hacking Shwapno’s system

3 hackers held for hacking Shwapno’s system Staff Correspondent | Published: 20:27, Aug 08,2021 (image)

3 #hackers held for #hacking Shwapno’s system | #TpromoCom #CyberSecurity #CyberCrime | The police on Saturday night arrested three members of a hackers’ group who hacked the digital system of Shwapno and generated illegal digital vouchers worth Tk 18 lakh, said a press release. https://bit.ly/3CIE97Y

The arrested are M Nasimul Islam, Rehanur Hasan Rashed and Raisul Islam. 

The Dhaka Metropolitan Police’s Counter Terrorism and Transnational Crime Unit chief and additional police commissioner M Asaduzzaman disclosed the information of their arrests at a press conference on Sunday. (read more)





Follow us on Social Media or email us:

Sunday, June 13, 2021

OnDemand | Changing the Entire Paradigm to Cybersecurity

OnDemand | Changing the Entire Paradigm to Cybersecurity | #TpromoCom #CyberSecurity #DataBreach #DataBreachToday | Register for this informative webinar on cybersecurity! https://bit.ly/3iFPspY

Most cybersecurity protections are based on looking for threats. The problem is, malware is evolving at an alarming rate and threat detection solutions, antivirus and EDR can no longer keep up. ThreatLocker CEO, Danny Jenkins will explain how he’s changing the entire approach and paradigm to cybersecurity with a clean and comprehensive approach to ensuring ransomware does not end up in your environment.

Register for this webinar to learn more about:
  • How easily malware can evade antivirus and other threat detection tools. 
  • The latest cybersecurity breaches along with assets and tools you can implement in your business. 
  • How to implement zero-trust security.

To see this presentation: 


Stormin  Protection: The Finest in Power Quality Assurance





Follow us on Social Media or email us:

Saturday, April 10, 2021

Handcuffs Over AI: Solving Security Challenges With Law Enforcement

Handcuffs Over AI: Solving Security Challenges With Law Enforcement
|  #TpromoCom #AI #CyberCrime #Police | We've tried everything else ... now it's time to make the prospect of getting caught -- and punished -- a real deterrent to cybercrime. (DarkReading) https://bit.ly/3t5ZO4x

For those of us who have been dumping budgets and hope into 20 years of broken promises, we find it very difficult to muster any degree of hope in the next round of techno-salvation. 

Five years ago, my suspicion turned to outright rebellious indignation and I started evaluating everything I believed to find a better path to sustainable cybersecurity operations (SecOps). 

To read the remainder of this news story: 





Follow us on Social Media or email us:

Friday, April 9, 2021

Well Known Credit Card Company Describes a New Skimming Method

#Visa Describes New #Skimming Attack Tactics | #TpromoCom #CreditCard #Criminals | Cybercriminals Using Web Shells to Control Retailers' Servers (govinfosecurity.com) https://bit.ly/3mywxNu

The web shells enable fraudsters conducting digital skimming attacks on e-commerce sites to establish and maintain access to compromised servers, deploy additional malicious files and payloads, facilitate lateral movement within a victim's network and remotely execute commands, Visa says.

In February, Microsoft reported spotting 140,000 web shells per month on servers from August 2020 to January 2021, which it said is almost twice the number from the same period the year before. These web shells, however, were not being used for retail attacks. (read more)


Direct link to this page: https://bit.ly/3mywxNu


Follow us on Social Media or email us:

Monday, March 29, 2021

Linux Systems in Peril of Hacking Hackers? Find Out Here!

New Bugs Could Let Hackers Bypass Spectre Attack Mitigations On Linux Systems
| #TpromoCom #Hacker #Linux #CyberSecurity | Cybersecurity researchers on Monday disclosed two new vulnerabilities in Linux-based operating systems that, if successfully exploited, could let attackers circumvent mitigations for speculative attacks such as Spectre and obtain sensitive information from kernel memory (thehackernews). https://bit.ly/3fn8fof

Discovered by Piotr Krysiuk of Symantec's Threat Hunter team, the flaws — tracked as CVE-2020-27170 and CVE-2020-27171 (CVSS scores: 5.5) — impact all Linux kernels prior to 5.11.8. Patches for the security issues were released on March 20, with Ubuntu, Debian, and Red Hat deploying fixes for the vulnerabilities in their respective Linux distributions. 

Find out more here: 

Contact TpromoCom for Content, Social Media,
Press Releases, and Web Design services.

Call 330-956-9003



Follow us on Social Media or email us:

So What Makes a Hacker Tick?

Understanding The Psyche Of A Modern-day #Hacker
| #TpromoCom #Hacker #CyberCrime #CyberSecurity | Every cyberattack varies in cause and damage. Despite this, they all contain key components that are applicable to both external and insider threats (informationsecuritybuzz).  
https://bit.ly/3fnBkQk

The tried and tested formula involves cyberattackers finding a way in, navigating the system, extracting information, and then exiting and covering their tracks. Learning these steps to understand the journey cyberattackers take will help you better protect your organisation from these kinds of attacks. 

You can read the reset of this article here: 


Start out taking FREE courses.
Buy a certificate when you pass your final exam!


Follow us on Social Media or email us:

Friday, March 26, 2021

Why It's Important to Take Down Dark Web Sites

The Case for Taking Down Dark Web Sites

Why It's Important to Take Down Dark Web Sites | #TpromoCom #DarkWeb #CyberSecurity #CyberCrime #Hackers | Taking Down Dark Web Sites May Cause Headache for Both the Bad Guys and the Good Guys (Idan Aharonihttps://bit.ly/2QDTO4J

It’s law enforcement’s main goal to apprehend criminals, and considering it takes time to build a case of evidence, dark web boards can be a treasure trove of leads and relevant data for a case, one that keeps growing as criminals post new content. 

It makes sense for them not to touch a board until they are ready to make their move and apprehend the bigger players on a certain site, usually an international operation involving multiple local agencies.

Read more here: 





Follow us on Social Media or email us:

Wednesday, March 17, 2021

The fire in the OVH datacenter also impacted APTs and cybercrime groups

The fire in the OVH datacenter also impacted APTs and cybercrime groups
| #TpromoCom #Fire #OVH #CyberSecurity | The fire at the OVH datacenter in Strasbourg also impacted the command and control infrastructure used by several nation-state APT groups and cybercrime gangs (securityaffairs)
https://bit.ly/3bYOHVb

OVH, one of the largest hosting providers in the world, has suffered this week a terrible fire that destroyed its data centers located in Strasbourg. The French plant in Strasbourg includes 4 data centers, SBG1, SBG2, SBG3, and SBG4 that were shut down due to the incident, and the fire started in SBG2 one. 

To read the rest of this news story, click here.





Follow us on Social Media or email us:

Tuesday, March 16, 2021

Microsoft cyber-attack turns into global crisis


Microsoft cyber-attack turns into global crisis | #TpromoCom #CyberSecurity #CyberAttack | In this edition, we tell you more about the vast cyber-attack on Microsoft Exchange. What started as an alleged state-sponsored attack is quickly becoming a global crisis, claiming at least 60,000 victims worldwide, mainly small and medium-sized businesses (france24). http://bit.ly/2OycsKS

Several days ago, Microsoft was targeted by a massive cyber-attack. Allegedly, it all began as a Chinese state-sponsored espionage attack against specific individuals using vulnerabilities in its email software. But now, it has escalated into a devastating global hacking scheme as criminal groups rush to compromise victims before they have time to secure their systems.

We ask Adrien Gendre, associate director at Vade Secure, to tell us more about the attack and what the hackers are hunting for. (read more)






Follow us on Social Media or email us: