Criminal Gives up Cronies Shows the Attack Plans

Yes an angry programmer hacker is mad they are not getting paid enough for their work, so they showed what they were doing to let everyone know how important they are!! Threatpost link about this story.     Apparently the command and control servers are at the following IP addresses: 162.244.80.235 85.93.88.165 185.141.63.120 82.118.21.1 There … Read more

Can Cloud Services be Abused? Does the Sun Come Up Every Day?

Yes cloud service can be abused – but let’s be specific: Dark reading article:   The attack chain begins with the threat actor sending potential victims an email—on a topic of likely interest or relevance to the victim—with a link to a document on Google Docs. Users who follow the link are directed to a … Read more

News that Changes Cybersecurity

The Exchange server hack keeps on going: https://www.technewsworld.com/story/87095.html  : (April 13 story) Fortune 500s Hit by MS Exchange Breach Maybe still unaware. Although this article lists a lot of Fortune 500 companies with large budgets, they seem to have missed the Microsoft Exchange Server vulnerability fix. Probably the reason is that this specific problem was … Read more

SolarWinds Hackers Hacked Multi-factor Authentication!!

Wait a second … I thought that MFA (Multi-Factor Authentication) was set up to prevent some attacks? The Googleblog post from a couple of years ago: Security Google blog had some data that proved the efficacy of MFA in this image: So MFA (or 2FA Two Factor Authentication) does prevent a number of potential attacks. … Read more

Cybersecurity Must be Attended to Or? Can the Unthinkable Happen to You?

Should Cybersecurity have some attention if you have not been hacked before? Does your business really need  more Cybersecurity awareness? I.e. So What… Cybersecurity!!! Is this what you are thinking? That does not matter to me ? I guess if this is your default thinking after every new headline of Breaches and attacks… For example … Read more