Hackers Are Ruthless: Attack Red Cross Red Crescent 500k stolen Info

From Brian Krebs’ KrebsonSecurity  website: On Jan. 19, the ICRC disclosed the compromise of servers hosting the personal information of more than 500,000 people receiving services from the Red Cross and Red Crescent Movement. The ICRC said the hacked servers contained data relating to the organization’s Restoring Family Links services, which works to reconnect people … Read more

Log4J has been fixed by Apache Software foundation

Due to an actively exploited zero-day vulnerability: https://thehackernews.com/2021/12/extremely-critical-log4j-vulnerability.html This bug is a 10 of 10 on the CVSS rating from the article a snippet: Tracked as CVE-2021-44228 and by the monikers Log4Shell or LogJam, the issue concerns a case of unauthenticated, remote code execution (RCE) on any application that uses the open-source utility and affects … Read more

New Cyberstrategy: FBI Depends on Hackers to Be Nice

Yes The hackers that just hacked the FBI email server only spammed thousands of email addresses and all they did was embarrass the FBI. The Criminal Justice Information Services division (CJIS) from FBI which apparently manages several national crime information systems, available to the criminal justice community. According to KrebsonSecurity  the “from address” emails to … Read more

Criminal Gives up Cronies Shows the Attack Plans

Yes an angry programmer hacker is mad they are not getting paid enough for their work, so they showed what they were doing to let everyone know how important they are!! Threatpost link about this story.     Apparently the command and control servers are at the following IP addresses: 162.244.80.235 85.93.88.165 185.141.63.120 82.118.21.1 There … Read more

Can Cloud Services be Abused? Does the Sun Come Up Every Day?

Yes cloud service can be abused – but let’s be specific: Dark reading article:   The attack chain begins with the threat actor sending potential victims an email—on a topic of likely interest or relevance to the victim—with a link to a document on Google Docs. Users who follow the link are directed to a … Read more