Showing posts with label Hacker. Show all posts
Showing posts with label Hacker. Show all posts

Friday, March 5, 2021

Exchange Server Attacks Spread After Disclosure of Flaws

Exchange Server Attacks Spread After Disclosure of Flaws (image)
Exchange Server Attacks Spread After Disclosure of Flaws | #TpromoCom #Microsoft #Hacker #Hackers | Forecast Calls for Backdoored Email as Well as Installing Ransomware, Cryptominers http://bit.ly/3sQrY34

And if some U.S. federal agencies haven't been busy enough with the SolarWinds crisis, there's a new urgent immediate task at hand: looking for signs their Exchange servers may have been compromised. 

The Cybersecurity and Infrastructure Security Agency issued an emergency directive on Wednesday ordering agencies to scour for forensics clues that servers may have been compromised (read more

TpromoCom provides content specific
to the Security and Life-Safety Industries.




Follow us on Social Media or email us:

Monday, February 22, 2021

China Hijacked an NSA Hacking Tool in 2014—and Used It for Years

China Hijacked an NSA Hacking Tool in 2014—and Used It for Years | #TpromoCom #ShadowBrothers #CyberSecurityt #CCP | The #hackers used the agency’s EpMe exploit to attack Windows devices years before the Shadow Brokers leaked the agency’s zero-day arsenal online (wired). http://bit.ly/3aK443b

MORE THAN FOUR years after a mysterious group of hackers known as the Shadow Brokers began wantonly leaking secret NSA hacking tools onto the internet, the question that debacle raised—whether any intelligence agency can prevent its "zero-day" stockpile from falling into the wrong hands—still haunts the security community. 

That wound has now been reopened, with evidence that Chinese hackers obtained and reused another NSA hacking tool years before the Shadow Brokers brought it to light. (read more)

Editorial Comment:
As business people, we must take inventory of our situation in order to take advantage of every advantage. Now that Joe Biden is president, considering his recent comments upselling the value of the CCP to the American way of life, it's more important than ever to remember the things we learned over the past four years concerning China's aspiration for global dominance. We must take this in consideration when making decisions that are integral to the success or failure of our businesses and our nation. --Al Colombo



Follow us on Social Media or email us:

Thursday, February 11, 2021

Cybersecurity expert warns about the dangers of working from home


Cybersecurity expert warns about the dangers of working from home
 | #TpromoCom | Nuclear war would require billions of dollars and years of development. But someone in a basement can pull off a devastating cyberattack that takes down the critical infrastructure for practically nothing (wrcbtv
). https://bit.ly/3a8LKQN

On computer monitors at cybersecurity companies around the country, animated world maps show live cyber-attacks happening around the world. The attacks targeting the United States are often directed at health care systems, government offices, and regular people who are working on their computers. The attacks are often administered through email attachments and links, and websites that contain links to malware. It's easy to look at those animated maps and realize we are at war.

To read the remainder of this informative article: 





Follow us on Social Media or email us:

Wednesday, February 10, 2021

'What nightmares are made of.' Hackers hit Fla. water supply

'What nightmares are made of.' Hackers hit Fla. water supply (image)

'What nightmares are made of.' Hackers hit Fla. water supply | #TpromoCom #WaterSupply #CyberSecurity | A #hacker tried to poison a Florida city's water supply by spiking levels of a dangerous chemical, law enforcement authorities said yesterday (eenews net). https://bit.ly/3tMxVze

The unsuccessful cyberattack Friday on a water treatment plant in Pinellas County — the first documented attempt to hack into and contaminate a U.S. community's water supply — raises questions around critical infrastructure security as water and energy utilities move to digitize their operations.

A hacker gained access to a water treatment facility serving around 15,000 people in the city of Oldsmar, changing the levels of sodium hydroxide... 





Follow us on Social Media or email us:

Monday, February 1, 2021

How the Best Hackers Learn Their Craft

How the Best #Hackers Learn Their Craft
 | #TpromoCom #CyberSecurity | Do you want to know how to build a top-ranked competitive hacking team?

It's all about the system. In sports, we understand systems that coaches can use to build a system for identifying talent, recruiting them, training them up, and competing in big games. Learn our proven system for building an elite team of hackers that win DEFCON. It's surprisingly easy, but not what you'd think.

Watch this informative webinar now...





Follow us on Social Media or email us:

Tuesday, January 12, 2021

What is a honeypot?

What is a honeypot? | #TpromoCom #Hacker #Server #Network #Security | Honeypots are decoy systems or servers deployed alongside production systems within your network (rapid7.com) https://bit.ly/3qdcd4P


When deployed as enticing targets for attackers, honeypots can add security monitoring opportunities for blue teams and misdirect the adversary from their true target. Honeypots come in a variety of complexities depending on the needs of your organization and can be a significant line of defense when it comes to flagging attacks early. 


This page will get into more detail on what honeypots are, how they are used, and the benefits of implementing them. 




Follow us on Social Media or email us:

Monday, January 11, 2021

The SolarWinds hack seems to be breathing new life into the supply chain security effort.

The #SolarWinds hack seems to be breathing new life into the supply chain #security effort
| #TpromoCom #CyberSecurity | The General Services Administration could soon start requiring on-site assessments of certain federal contractors under a new program to scrutinize risks to the supply chain https://bit.ly/39oAaiL

Tucked into the draft of a new governmentwide acquisition vehicle for information technology services called Polaris is language describing a tool to “identify, assess and monitor supply chain risks of critical vendors.” It would use classified and unclassified sources.

GSA said once the tool it’s developing—referred to as the Vendor Risk Assessment Program—is complete, “the contractor agrees




Follow us on Social Media or email us:

Monday, January 4, 2021

A chat with hacker Keren Elazari [Podcast]

A chat with hacker Keren Elazari [Podcast] | #TpromoCom #Hacker #WhiteHat #Cyber | How did the movie “Hackers” inspire a girl to grow up to become a hacker herself? Find out from security analyst and friendly hacker Keren Elazari. http://bit.ly/38f71aE

Hear about Keren’s incredible journey, why hackers should be welcomed with open arms, and the inspiration that guided her career.

"Ms Elazari is a legend in her own time. Listening to her personal story of how she became a hacker with a hankering to do good as a white hat is inspiring to say the very least," says Al Colombo, Senior Design Specialist with Thunder Promotions (TpromoCom) of Canton, Ohio. 

Without further ado, CLICK HERE and listen to the story of Keren Elazari!


Follow us on Social Media or email us:

Saturday, December 19, 2020

Integrators: Beware More Supply Chain Cyber Attacks


Integrators: Beware More Supply Chain Cyber Attacks
 
| #TpromoCom #SolarWinds #Hacker #Hackers #CyberSecurity | The SolarWinds hack is an example of a supply chain attack that integrators and AV software companies need to defend against.

The recent news of a large-scale attack on the part of a foreign government utilizing popular network monitoring tools should have integrators questioning the security of the remote monitoring tools they use.

U.S. government officials, cybersecurity experts and tech giants are working around the clock to uncover more evidence and possibly other supply chain attack vectors after IT software company SolarWinds disclosed that versions of its popular Orion product was compromised by foreign cyber actors.

Read the remainder of this Commercial Integrator news story here: 


Thursday, December 17, 2020

How suspected Russian hackers outed their massive cyberattack

How suspected Russian hackers outed their massive cyberattack | #TpromoCom #Hacker #Hackers #CyberSecurity #Government | A cybersecurity firm says a suspicious log-in prompted it to investigate what turned out to be a gaping security hole for the U.S. government and many large companies (politico.com
Foreign hackers who pulled off a stealthy breach of at least a dozen federal agencies got caught after successfully logging in to a top cybersecurity firm’s network, tipping the company off to a broader hacking campaign targeting the U.S. government, according to officials from the firm and congressional aides briefed on the issue.
The suspicious log-in prompted the firm, FireEye, to begin investigating what it ultimately determined to be a highly damaging vulnerability in software used across the government and by many Fortune 500 companies.
Read more? 

Wednesday, December 16, 2020

How the Best Hackers Learn Their Craft

This is a webinar by David Brumley, CEO, ForAllSecure, conducted in 2018. Yes, it's two years old, but it's a great beginning for those of us who know very little about hacking or hackers:
Do you want to know how to build a top-ranked competitive hacking team? It's all about the system. In sports, we understand systems that coaches can use to build a system for identifying talent, recruiting them, training them up, and competing in big games. Learn our proven system for building an elite team of hackers that win DEFCON. It's surprisingly easy, but not what you'd think.