All posts by Patrick Domingues
Hacker Group TA505 Ramping Up Their Trickery
Hacker Group TA505 are cyber criminals through and through, they are the bunch that brought you the Locky Ransomware. TA505 have decided to go after more US companies so get ready for more phishing attacks. These phishing attacks will be tailored specifically to their targets so watch out for tricky emails containing attachments like word…
Facebook Toolkit Awesome Automation.
I needed to automate some of these Facebook tasks and I’m sure some of you want to do the same, auto adding people, auto messaging, auto accept requests and a few others. After looking around for a bit I ran into something quite cool to automate certain tasks in FB. It’s a plugin by PlugEx…
Lean Six Sigma Implementation in IT Operations
Lean Six Sigma has been around for quite some time and is now starting to be used in IT Operations more often to provide ITSM success. The implementation of Lean Six Sigma for the most part into the daily IT Operations has been proved fruitful for companies because the strengths of Six Sigma which lies…
Adobe Pushed Emergency Patches For Two Critical Flaws.
Adobe has pushed out security updates for two critical vulnerabilities . Adobe Acrobat and Reader for Windows and Mac are affected. The flaw reported by Apelt is identified as the CVE-2018-16011 and is a bug that can lead to arbitrary code execution. An Attacker can exploit the flaw by tricking an end user into clicking…
Microsoft Edge Being Switched To Chromium
If you haven’t heard already Microsoft Edge is switching to the open-source Chromium software. This is the same software that Google Chrome is based on. This is a beautiful idea most because who wants to navigate a hand full of folder paths to reach favorites. I really hope that they will place them back to…
Best Practice Checklist For Business Continuity
No one can predict the future; however, you can be ready with a sound business continuity plan. The business continuity checklist is the first step in the BCP process. The checklist is not an exhaustive list, it is a simple tool that can be used to ensure that the basic BCP process has been initiated and the…
NASA Data Breach Exposing Employee Records
In October Hackers were successful in hacking into and obtaining the information that resides from within an HR Database. The amount of information extracted is potentially significant which compromised records from July 2006 to October 2018 from previous and current employees. There was an internal Memo sent Tuesday to NASA Employees and published at spaceref.com….
Memes in Twitter can be used to inject Malware
This new malware uses Twitter to deploy Remote Access Tojans (RATs) from a image. The malware can infect vulnerable computers and collect information, take screenshots and jump to other computers to infect them as well. Trend Micro said in their Blog Post that the malware listens for commands within the the hackers twitter account ….
6.8M Facebook Users Private Photos Exposed
The Facebook bug allowed 1,500 apps built by 800+ developers to view unposted private photos. Friday Facebook disclosed that a bug in the platform enabled third-party apps to access unpublished photos of millions of users. When your writing a new post and upload a photo but do not finish posting it Facebook will store it…
Top Worst Passwords Of All Time
Take security serious, here is a lists of the top 500 worst passwords. Any password documented publicly or available in the darkweb can be used in a dictionary attack. This is a form of brute force attack technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds…