Showing posts with label Hacker. Show all posts
Showing posts with label Hacker. Show all posts

Monday, March 29, 2021

Suspected Russian hackers gained access to US homeland security emails

Suspected Russian hackers gained access to US homeland security emails
| #TpromoCom #SolarWinds #Hacker #CyberSecurity | Intelligence value of SolarWinds hacking of then acting secretary Chad Wolf is not publicly known (guardian). https://bit.ly/3rzPfFB

Suspected Russian hackers gained access to email accounts belonging to the Trump administration’s head of homeland security (DHS) and members of cybersecurity staff whose jobs included hunting threats from foreign countries, the Associated Press (AP) has learned. https://bit.ly/3rzPfFB

“The SolarWinds hack was a victory for our foreign adversaries and a failure for DHS,” said Rob Portman, top Republican on the Senate homeland security committee. “We are talking about DHS’s crown jewels.” 

Read the rest here: 


Make HIM the easiest and most effective method
to acquire the skill-sets and master the skill-craft.



Follow us on Social Media or email us:

Linux Systems in Peril of Hacking Hackers? Find Out Here!

New Bugs Could Let Hackers Bypass Spectre Attack Mitigations On Linux Systems
| #TpromoCom #Hacker #Linux #CyberSecurity | Cybersecurity researchers on Monday disclosed two new vulnerabilities in Linux-based operating systems that, if successfully exploited, could let attackers circumvent mitigations for speculative attacks such as Spectre and obtain sensitive information from kernel memory (thehackernews). https://bit.ly/3fn8fof

Discovered by Piotr Krysiuk of Symantec's Threat Hunter team, the flaws — tracked as CVE-2020-27170 and CVE-2020-27171 (CVSS scores: 5.5) — impact all Linux kernels prior to 5.11.8. Patches for the security issues were released on March 20, with Ubuntu, Debian, and Red Hat deploying fixes for the vulnerabilities in their respective Linux distributions. 

Find out more here: 

Contact TpromoCom for Content, Social Media,
Press Releases, and Web Design services.

Call 330-956-9003



Follow us on Social Media or email us:

So What Makes a Hacker Tick?

Understanding The Psyche Of A Modern-day #Hacker
| #TpromoCom #Hacker #CyberCrime #CyberSecurity | Every cyberattack varies in cause and damage. Despite this, they all contain key components that are applicable to both external and insider threats (informationsecuritybuzz).  
https://bit.ly/3fnBkQk

The tried and tested formula involves cyberattackers finding a way in, navigating the system, extracting information, and then exiting and covering their tracks. Learning these steps to understand the journey cyberattackers take will help you better protect your organisation from these kinds of attacks. 

You can read the reset of this article here: 


Start out taking FREE courses.
Buy a certificate when you pass your final exam!


Follow us on Social Media or email us:

Monday, March 22, 2021

Swiss Firm Says It Has Accessed Servers of a SolarWinds Hacker

Swiss Firm Says It Has Accessed Servers of a SolarWinds Hacker | #TpromoCom #Hacker #SolarWinds #CyberSecurity | PRODAFT report details nicknames hackers used, hours they worked (Bloomberg) https://bit.ly/3f7rlyq

 Swiss cybersecurity firm says it has accessed servers used by a hacking group tied to the SolarWinds breach, revealing details about who the attackers targeted and how they carried out their operation. The firm, PRODAFT, also said the hackers have continued with their campaign through this month.

Opinion: One day the good guys will have an AI-based means of protection that won't just penetrate an attacker's machine, but will capture that machine, revealing his geographical  location and much more.  I wouldn't be at all surprised if our military isn't already on it. --Al Colombo





Follow us on Social Media or email us:

Acer Faced With Ransom Up To $100 Million After Hackers

Acer Faced With Ransom Up To $100 Million After Hackers

Acer Faced With Ransom Up To $100 Million After Hackers | #TpromoCom #Hacker #Ransom #Acer | The REvil ransomware group has claimed yet another high-profile victim. The criminals are demanding a massive $50 million from their latest target: Taiwanese computer manufacturer Acer (Lee Mathews). http://bit.ly/3d28vX3

That’s the discounted rate REvil will accept if Acer agrees to pay quickly, and it’s already believed to be a record sum for ransomware demands. The previous high of $30 million was also linked to a REvil attack. (read more)





Follow us on Social Media or email us:

Thursday, March 11, 2021

Global hackers raid Verkada’s clients’ video surveillance data


Global hackers raid Verkada’s clients’ video surveillance data | #TpromoCom | More than 150K #security #cameras are breached in a bold cyber-attack on the cloud-based platform (Steve Lasky) https://bit.ly/3rHr1tC

Thunder Promotions (TpromoCom, Image)
In yet another jolting reminder of the potential vulnerability of end-point security devices in general and video surveillance cameras in particular, 
Verkada, a cloud-managed and edge-based software platform that integrates video security cameras, access control solutions and other sensor-rich technology, found itself the victim yesterday of a massive breach of its video network as more than 150,000 surveillance cameras were hacked.

A group of hackers accessed and published live video feeds from the likes of Tesla and Cloudflare, along with videos and images apparently taken from a variety of other Verkada clients, such as offices, warehouses, factories jails, psychiatric wards, banks, and schools. Bloomberg News, which first reported the breach, said footage viewed by a reporter showed staffers at Florida hospital Halifax Health tackling a man and pinning him to a bed. (read more)




Follow us on Social Media or email us:

Tuesday, March 9, 2021

Local Governments Targeted by Hackers

Hackers Exploit Exchange Flaws to Target Local Governments | #TpromoCom #Hacker #Hackers #CyberSecurity | Hackers have targeted units of local government in the U.S. by attempting to exploit unpatched vulnerabilities in Microsoft Exchange email servers, according to a new report by the security firm FireEye.

While Microsoft has said that a Chinese-linked hacking group that has been exploiting the vulnerabilities in Exchange is known to target infectious disease researchers, law firms, higher education institutions, defense contractors, policy think tanks and nongovernment organizations, FireEye analysts note that other groups appear to have set their sights on local government networks.

"Based on our telemetry, we have identified an array of affected victims, including U.S.-based retailers, local governments, a university and an engineering firm. Related activity may also include a Southeast Asian government and Central Asian telecom," according to the FireEye report. (read more)







Follow us on Social Media or email us:

Friday, March 5, 2021

Exchange Server Attacks Spread After Disclosure of Flaws

Exchange Server Attacks Spread After Disclosure of Flaws (image)
Exchange Server Attacks Spread After Disclosure of Flaws | #TpromoCom #Microsoft #Hacker #Hackers | Forecast Calls for Backdoored Email as Well as Installing Ransomware, Cryptominers http://bit.ly/3sQrY34

And if some U.S. federal agencies haven't been busy enough with the SolarWinds crisis, there's a new urgent immediate task at hand: looking for signs their Exchange servers may have been compromised. 

The Cybersecurity and Infrastructure Security Agency issued an emergency directive on Wednesday ordering agencies to scour for forensics clues that servers may have been compromised (read more

TpromoCom provides content specific
to the Security and Life-Safety Industries.




Follow us on Social Media or email us:

Monday, February 22, 2021

China Hijacked an NSA Hacking Tool in 2014—and Used It for Years

China Hijacked an NSA Hacking Tool in 2014—and Used It for Years | #TpromoCom #ShadowBrothers #CyberSecurityt #CCP | The #hackers used the agency’s EpMe exploit to attack Windows devices years before the Shadow Brokers leaked the agency’s zero-day arsenal online (wired). http://bit.ly/3aK443b

MORE THAN FOUR years after a mysterious group of hackers known as the Shadow Brokers began wantonly leaking secret NSA hacking tools onto the internet, the question that debacle raised—whether any intelligence agency can prevent its "zero-day" stockpile from falling into the wrong hands—still haunts the security community. 

That wound has now been reopened, with evidence that Chinese hackers obtained and reused another NSA hacking tool years before the Shadow Brokers brought it to light. (read more)

Editorial Comment:
As business people, we must take inventory of our situation in order to take advantage of every advantage. Now that Joe Biden is president, considering his recent comments upselling the value of the CCP to the American way of life, it's more important than ever to remember the things we learned over the past four years concerning China's aspiration for global dominance. We must take this in consideration when making decisions that are integral to the success or failure of our businesses and our nation. --Al Colombo



Follow us on Social Media or email us:

Thursday, February 11, 2021

Cybersecurity expert warns about the dangers of working from home


Cybersecurity expert warns about the dangers of working from home
 | #TpromoCom | Nuclear war would require billions of dollars and years of development. But someone in a basement can pull off a devastating cyberattack that takes down the critical infrastructure for practically nothing (wrcbtv
). https://bit.ly/3a8LKQN

On computer monitors at cybersecurity companies around the country, animated world maps show live cyber-attacks happening around the world. The attacks targeting the United States are often directed at health care systems, government offices, and regular people who are working on their computers. The attacks are often administered through email attachments and links, and websites that contain links to malware. It's easy to look at those animated maps and realize we are at war.

To read the remainder of this informative article: 





Follow us on Social Media or email us:

Wednesday, February 10, 2021

'What nightmares are made of.' Hackers hit Fla. water supply

'What nightmares are made of.' Hackers hit Fla. water supply (image)

'What nightmares are made of.' Hackers hit Fla. water supply | #TpromoCom #WaterSupply #CyberSecurity | A #hacker tried to poison a Florida city's water supply by spiking levels of a dangerous chemical, law enforcement authorities said yesterday (eenews net). https://bit.ly/3tMxVze

The unsuccessful cyberattack Friday on a water treatment plant in Pinellas County — the first documented attempt to hack into and contaminate a U.S. community's water supply — raises questions around critical infrastructure security as water and energy utilities move to digitize their operations.

A hacker gained access to a water treatment facility serving around 15,000 people in the city of Oldsmar, changing the levels of sodium hydroxide... 





Follow us on Social Media or email us: