The Cross-Platform Nightmare: Ransomware’s Assault on Various OSs
Uncover the alarming reach of RedAlert ransomware as it targets both Windows and Linux, encrypting vital files and shutting down virtual machines.
Introduction
Ransomware has become an ever-increasing threat to businesses and individuals alike, with cybercriminals constantly evolving their tactics to exploit vulnerabilities across different operating systems. One such ransomware that has been making waves in the cybersecurity landscape is the notorious RedAlert. In this article, we delve into the intricacies of RedAlert, its unique features, and the impact it has on various operating systems.
Understanding RedAlert: The Linux Version and VMware Servers
RedAlert, also known as N13V in its internal development notes, is a formidable ransomware that specifically targets VMware servers. The developers behind this malicious program have employed sophisticated techniques to ensure maximum damage and extortion potential. RedAlert goes beyond traditional ransomware by not only encrypting files but also shutting down running virtual machines.
The Devastating Impact on
… Read the restAre C-Suite Executives A Threat To Cyber Security?
A new study shows that executives are more vulnerable to security breaches than ever. BlackCloak, a cybersecurity company, surveyed 1,000 of its members—and discovered that 23% of executives have open ports on their home networks. And what’s worse, 20% of those with open ports have open security cameras.
To top it off, 27% of executives’ own devices contain malware, 76% of their own devices are actively leaking data, and 87% of executives’ own devices have no security installed.
For security professionals, this is the most disturbing finding of all: Only 8% of executives have multi-factor authentication enabled on the majority of their apps and devices. And 87% of them have passwords that are leaked on the dark web. Thats a damn shame.
The general population is very vulnerable to cyber threats, but executives are even more susceptible to them. According to John Hellickson, CISO at Coalfire, executives often put pressure … Read the rest
Top Cyber Security Bad Habits
Top Cyber Security bad habits that stop you from preventing costly breaches, ransomware attacks, and phishing-based endpoint attacks. Cybercrime is on the increase. Cyberattacks are becoming faster, more subtle, and more sophisticated. Breaches from these attacks have been on the rise. The number of breaches rose 27 percent in 2021. These attacks show no signs of slowing down.
It’s hard to believe, but many people are careless about their digital security. Such bad habits can be more dangerous than it seems at first. For example, reusing the same password for multiple accounts is a common bad habit. It may not seem like an issue if you have only one account on a site, but what if that site gets breached? You’ll be in trouble if the hackers steal your password from there and then log into your other accounts with it.
Businesses cannot afford to ignore the importance of cyber … Read the rest
How to Add Unifi Protect Cameras On A VLAN
In this tutorial you will learn how to configure a VLAN with DHCP on UniFi Controller 7.0 and then add UniFi Protect Cameras to the VLAN.
Task Details
- Log into Your UniFi Controller.
- Create a virtual network (VLAN).
- Identify Camera Ports and apply VLAN.
Task 1: Log Into your UniFi Controller
- Open a browser tab and go to the Ubiquiti Account Portal using URL https://unifi.ui.com/
- Sign in with your username and password on Ubiquiti Account Portal.
- Select your Unifi Controller.
Task 2: Create Virtual Network
-
Click Settings
-
Click Networks
-
Once the page loads click on Create New Network.
-
Name your Network: UniFi Protect.
-
Uncheck Auto Scale Network.
-
Change the 3rd octet to any number you like, this will also be used as the VLAN ID.
- Scroll down to Advanced Configuration and select Manual.
- Change the VLAN ID to 200.
- Enable IGMP Snooping for better performance.
- Scroll
Millions Phished On Facebook Messenger
An incredibly dangerous phishing scam has been discovered that takes advantage of Facebook’s messaging system. Millions of Facebook users fell victim to it, and millions more may still be tricked.
There is a phishing scam on Facebook. A recent report says that a huge number of Facebook users have fallen for this scam and given up their passwords. The scam is still happening, and around 10 million users have fallen for the phishing scam.
According to a report published by researchers at PIXM Security, a scam has been targeting Facebook users for months. This cyberattack started last year and increased in September. The researchers believe that millions of Facebook users were exposed each month by the scam. The attack remains active today.
PIXM has allegedly uncovered that the scammer is one person, who is located in Colombia. The reason PIXM believes this is because each message links back to a … Read the rest
How to Upgrade Ubuntu Server 20.04 to Ubuntu 22.04
In this tutorial you will learn how to upgrade your Ubuntu Server 20.04 LTS to Ubuntu Server 22.04 LTS.
Ubuntu 22.04 Dates
Below you can find list of some important dates relating to Ubuntu 22.04 LTS
- Official Release: April 21, 2022
- End of Life (end of official support): April 2027
- Extended Support End of Life (available with subscription): April 2032
What’s New?
Ubuntu 22.04 provides major enhancements, new capabilities, and a number of new software packages such as:
- PHP 8.1.2
- OpenSSL 3.0
- Ruby 3.0
- Python 3.10.4
- MySQL 8.0.28
- PostgreSQL 14.2
- Linux kernel v5.15.0-25 & MESA 22
For a comprehensive list of all the new features and software packages, check out the release notes.
Prerequisites
- Make sure to have a minimum of 20GB of available storage.
- Create a Backup before upgrade!
- Use Putty to SSH and upgrade.
Lets get started
1. Lets make sure we have all the installed … Read the rest
Workaround For One-Click 0Day Vulnerability Follina
Microsoft announced its workaround for a zero-day vulnerability that has already been used by hackers. A threat actor already has exploited the vulnerability to target organizations in Russia and Tibet, researchers said. This vulnerability was identified back in April and is dubbed ‘Follina’.
Microsoft’s own tool reported a flaw in the way it handled remote control of its products. The remote-control execution (RCE) flaw, tracked as CVE-2022-3019, is associated with the Microsoft Support Diagnostic Tool (MSDT), which, ironically, itself collects information about bugs in the company’s products and reports to Microsoft Support.
If hackers get into your system, they can install programs, view, change, or delete your data, or create new accounts.
… Read the rest“A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word,” Microsoft explained in its guidance on the Microsoft Security Response Center. “An attacker who successfully exploits
Snake Keylogger Spreads Through Malicious PDFs: A Comprehensive Analysis
Discover how the Snake Keylogger malware spreads through malicious PDFs in a comprehensive analysis of its tactics and evasion techniques.
Introduction
In the ever-evolving landscape of cyber threats, a new campaign has emerged, exploiting unsuspecting victims through a combination of a malicious PDF file and a 22-year-old Office bug. The campaign, discovered by the diligent researchers at HP Wolf Security, showcases the ingenuity of attackers in their relentless pursuit of compromising sensitive information. This article aims to provide a comprehensive analysis of this “unusual” campaign and shed light on the tactics employed by cybercriminals to propagate the Snake Keylogger malware.
The Rise of PDF Malware
Traditionally, malicious email campaigns have relied heavily on Microsoft Office file formats, such as Word and Excel, to conceal and distribute malware. However, the discovery of this campaign demonstrates a shift in tactics, as attackers utilize weaponized PDF documents to infiltrate unsuspecting systems. While PDFs … Read the rest
How To Create an Azure Load Balancer – Lab9
In this tutorial you will learn how to create a Load Balancer in Azure. This lab I will walk you through the steps to deploy a load balancer to load balance virtual machine traffic.
What is an Azure Load Balancer?
- An Azure load balancer provides high availability by distributing incoming traffic among healthy VMs and it works at Layer- 4 of OSI Reference Model using the TCP and UDP protocols to manage transaction traffic based on a simple load balancing algorithm and basic information such as server connections and response times.
Task Details
- Log into Azure Portal.
- Create a virtual network.
- Create NAT gateway.
- Create load balancer.
- Create 3 virtual machines.
- Install IIS.
- Test the load balancer.
Task 1: Log into Azure Portal
- Open a browser tab and go to the Azure portal using URL https://portal.azure.com.
- Sign in with your username and password on azure portal.
Task 2: Create
… Read the restAzure Fundamentals AZ-900: The Foundation for Cloud Success
Gain the essential knowledge and skills for cloud success with Azure Fundamentals AZ-900. Unlock the potential of Microsoft Azure Foundation.
Introduction
I am happy to announce that I achieved my Microsoft Azure Fundamentals AZ-900 Certification. The AZ-900 for me was an interesting exam. I went in thinking I was going to fail even after putting in 20+ hours of studying. I suppose it’s better to over prepare though. I was hoping to get 55 questions, so it gave me room for more mistakes however they only gave me 35 questions and I was shocked right out of the gate. With all my over studying I was able to breeze through the questions and pass the Microsoft Azure Fundamentals Az-900 with a score of 805. It’s also to remember scores are no big deal a pass is a pass, and you achieved your certification. The most important thing is to schedule … Read the rest