cybersecurity

How IT Departments Scrambled to Address the CrowdStrike Chaos

How IT Departments Scrambled to Address the CrowdStrike Chaos

Just before 1:00 am local time on Friday, a system administrator for a West Coast company that handles funeral and mortuary services woke up suddenly and noticed his computer screen was aglow. When he checked his company phone, it was exploding with messages about what his colleagues were calling a network issue. Their entire infrastructure was down, threatening to upend funerals and burials.It soon became clear the massive disruption was caused by the CrowdStrike outage. The security firm accidentally caused chaos around the world on Friday and into the weekend after distributing faulty software to its Falcon monitoring platform, hobbling…
Read More
Russia-linked hackers cut heat to 600 Ukrainian apartment buildings in the dead of winter, researchers say

Russia-linked hackers cut heat to 600 Ukrainian apartment buildings in the dead of winter, researchers say

Cybersecurity company Dragos has flagged malware that can attack industrial control systems (ICS), tricking them into malicious behavior like turning off the heat and hot water in the middle of winter. TechCrunch reports that’s precisely what the malware, dubbed FrostyGoop, did this January in Lviv, Ukraine, when residents in over 600 apartment buildings lost heat for two days amid freezing temperatures.Dragos says FrostyGoop is only the ninth known malware designed to target industrial controllers. It’s also the first to specifically set its sights on Modbus, a widely deployed communications protocol invented in 1979. Modbus is frequently used in industrial environments…
Read More
Huge Microsoft Outage Linked to CrowdStrike Takes Down Computers Around the World

Huge Microsoft Outage Linked to CrowdStrike Takes Down Computers Around the World

Banks, airports, TV stations, hotels, and countless other businesses are all facing widespread IT outages, leaving flights grounded and causing widespread disruption, after Windows machines have displayed errors worldwide.In the early hours of Friday, companies in Australia running Microsoft’s Windows operating system started reporting devices showing Blue Screens of Death (BSODs). Shortly after, reports of disruptions started flooding in from around the world, including from the UK, India, Germany, the Netherlands, and the US: TV station Sky News went offline, and US airlines United, Delta, and American Airlines issued a “global ground stop” on all flights.The widespread Windows outages have…
Read More
Why are CTFs so important???

Why are CTFs so important???

CTFs are cybersec. competitions where participants solve challenges to find "flags" (pieces of info) hidden in various systems. These challenges test your skills in areas such as cryptography, forensics, reverse engineering, web exploitation, and binary exploitation. CTFs are designed for all skill levels, from beginners to experts. Types of CTFs Jeopardy-Style CTFs: Participants solve a variety of independent challenges in different categories to earn points. The team with the most points at the end wins. Attack-Defense CTFs: Teams are given identical systems to secure and defend while attempting to exploit their opponents' systems. Mixed-Style CTFs: Combines elements of both Jeopardy…
Read More
Google Nears $23 Billion Deal for Cybersecurity Firm Wiz, WSJ Reports

Google Nears $23 Billion Deal for Cybersecurity Firm Wiz, WSJ Reports

Google parent Alphabet Inc. is in advanced talks to buy cybersecurity startup Wiz in a deal that could fetch $23 billion, the Wall Street Journal reported, citing people with knowledge of the matter.The deal would be Alphabet’s largest acquisition ever and could come together “soon,” the newspaper said. Source link lol
Read More
How Infrastructure Monitoring Can Prevent a Cyber Attack

How Infrastructure Monitoring Can Prevent a Cyber Attack

In today's digital age, where data breaches and cyber threats pose major risks to businesses, proactive cybersecurity measures are more needed than ever. One of the most effective defenses gaining prominence is infrastructure monitoring. Let’s explore the pivotal role of infrastructure monitoring in preemptively thwarting cyber attacks through real-world examples, industry insights, and best practices. Cybersecurity Challenges Cyber attacks continue to evolve in sophistication and frequency, targeting organizations across all sectors. The consequences of these attacks can be devastating, ranging from financial losses and operational disruptions to irreparable damage to brand reputation. As businesses increasingly rely on digital infrastructure, securing…
Read More
OpenAI hit by two big security issues this week

OpenAI hit by two big security issues this week

OpenAI seems to make headlines every day and this time it's for a double dose of security concerns. The first issue centers on the Mac app for ChatGPT, while the second hints at broader concerns about how the company is handling its cybersecurity.Earlier this week, engineer and Swift developer Pedro José Pereira Vieito the Mac ChatGPT app and found that it was storing user conversations locally in plain text rather than encrypting them. The app is only available from OpenAI's website, and since it's not available on the App Store, it doesn't have to follow Apple's sandboxing requirements. Vieito's work…
Read More
Como um Malware opera, quais são os seus tipos e como se proteger.

Como um Malware opera, quais são os seus tipos e como se proteger.

No mundo digital de hoje, a segurança cibernética se torna cada vez mais importante. Entre as principais ameaças, os malwares se destacam por sua capacidade de causar danos significativos a dispositivos, redes e dados. Entender o funcionamento, os tipos e as medidas de proteção contra malwares é essencial para garantir a segurança online. Mas, o que é um Malware? Malware, abreviação de software malicioso, é um termo genérico que engloba diversos tipos de programas nocivos projetados para causar danos ou obter acesso não autorizado a sistemas computacionais, causando algum prejuízo. Esses softwares podem ser criados com diversas motivações, como roubo…
Read More

Quantum Key Distribution Revolutionizing Secure Communications

In a world where cybersecurity threats are perpetually evolving, the need for rock-solid encryption methods has never been more pressing. Enter Quantum Key Distribution (QKD) – a groundbreaking advancement that promises to redefine secure communication and protect our data from adversaries wielding even the most powerful quantum computers. What is Quantum Key Distribution? Quantum Key Distribution is a method of securely distributing cryptographic keys between two parties using the principles of quantum mechanics. The genius of QKD lies in its utilization of quantum states to transmit keys, ensuring that any attempt to intercept or eavesdrop on the communication fundamentally alters…
Read More
Microsoft reveals further emails compromised by Russian hack

Microsoft reveals further emails compromised by Russian hack

An attack on Microsoft by Russian hackers had further implications than initially reported. The tech giant is notifying additional individuals that emails between them and Microsoft were accessed, Bloomberg reports. A group known as Midnight Blizzard or Nobelium orchestrated this attack, along with the 2020 SolarWinds hack. The US government has previously linked Midnight Blizzard to the Russian Foreign Intelligence Service.Microsoft previously informed some individuals that their emails were viewed, but the company is now sharing specifics. "This week we are continuing notifications to customers who corresponded with Microsoft corporate email accounts that were exfiltrated by the Midnight Blizzard threat…
Read More
No widgets found. Go to Widget page and add the widget in Offcanvas Sidebar Widget Area.