Hacker Group TA505 Ramping Up Their Trickery

Hacker Group TA505 are cyber criminals through and through, they are the bunch that brought you the Locky Ransomware.  TA505 have decided to go after more US companies so get ready for more phishing attacks. 

These phishing attacks will be tailored specifically to their targets so watch out for tricky emails containing attachments like word docs, excel and pdf’s.

  1. Don’t open an attachment unless you know who it is from & are expecting it.
  2. Be cautious about email messages that instruct you to enable macros before downloading Word or Excel attachments. 
  3. Read More Email Security Tips

 

These attachments will have RAT payloads which will contain a macro that will deployed the AMMYY Remote Software To the computer without the end user knowing which then it will allow them to remotely access your computer and they will install Cryptocurrency miners. These miners are less noticeable to the user because it uses … Read the rest

Facebook Toolkit Awesome Automation.

I needed to automate some of these Facebook tasks and I’m sure some of you want to do the same, auto adding people, auto messaging, auto accept requests and a few others. After looking around for a bit I ran into something quite cool to automate certain tasks in FB. It’s a plugin by PlugEx called Toolkit For FB . This Plugin is only for Google Chrome so make sure you have that installed

Click all like buttons

  • This tool will allow you to like multiple posts on Facebook.

Accept or reject all friend requests

  • This tool will allow you to accept or reject multiple Facebook friend requests.

Click all poke buttons

  • This tool will allow you to poke multiple friends on Facebook .

Click all add friend buttons

  • This tool will allow you to send friend requests to multiple people.

Click all share buttons

  • This tool will allow you
Read the rest

Lean Six Sigma Implementation in IT Operations

Lean Six Sigma has been around for quite some time and is now starting to be used in IT Operations more often to provide ITSM success.  The implementation of Lean Six Sigma for the most part into the daily IT Operations has been proved fruitful for companies because the strengths of Six Sigma which lies in the data driven approach. It has supported in minimizing the Project Duration and the Lean Six Sigma framework can be used by IT professionals towards challenges and overcome solutions for tomorrow.

Lean Six Sigma is a defect reduction methodology that can transform organizations to focus on the quality of the customer experience, Lean Six Sigma aims to measure and improve both internal processes, such as network speed and reliability, and line-of-business processes in which IT has a role.

 

In this challenging World, IT and the management of information must be handled with care and … Read the rest

Adobe Pushed Emergency Patches For Two Critical Flaws.

Adobe has pushed out security updates for two critical vulnerabilities . Adobe Acrobat and Reader for Windows and Mac are affected.

The flaw reported by Apelt is identified as the CVE-2018-16011 and is a bug that can lead to arbitrary code execution. An Attacker can exploit the flaw by tricking an end user into clicking a PDF file which would execute a script with the privileges of the current logged in user.

The last vulnerability was discovered by Hariri and identified it as the CVE-2018-19725, is a security bypass flaw that could result in privilege escalation.

Contact your IT Leaders and make sure your software is updates. Some of you may already have the software to auto update or you can try to update the software yourself by opening up Adobe Acrobat or Reader and clicking Help Check for Updates .

More Resources for downloads.Read the rest

Microsoft Edge Being Switched To Chromium

If you haven’t heard already Microsoft Edge is switching to the open-source Chromium software. This is the same software that Google Chrome is based on. This is a beautiful idea most because who wants to navigate a hand full of folder paths to reach favorites. I really hope that they will place them back to the original location. The reason why Microsoft is moving to the Chromium based software is due to website compatibility issues. May developers use Macs to cram out code and graphics for websites and well these Mac users do not have access to Edge. Microsoft said that the new browser can be used on Macs which will increase compatibility not only for current sites but for future sites as well.

Currently there is no beta or screenshots of the new browser and we will most likely have to wait for late 2019 before we can get … Read the rest

Best Practice Checklist For Business Continuity

No one can predict the future; however, you can be ready with a sound business continuity plan. The business continuity checklist is the first step in the BCP process.  The checklist is not an exhaustive list, it is a simple tool that can be used to ensure that the basic BCP process has been initiated and the Division management has considered what needs to be done to keep essential functions operating if an adverse event occurs.  The checklist is somewhat “information centric” as organisation’s reliance on information is increasing and its successful management provides competitive advantage.

Program Initiation and Management (Pre-Planning)

  • Establish the need for Business Continuity Program
  • Scope of legal and regulatory authority
  • BCP Sponsor (Senior Management)
  • Business Continuity Steering Committee (5-8 people)
  • BCP protects core assets

 

Risk Evaluation and Control (Pre-Planning)

  • Prioritize planning and resource allocation
  • Identify and mitigate exposures
  • Identify the threats, risks and vulnerabilities
  • Gather information
Read the rest

NASA Data Breach Exposing Employee Records

In October Hackers were successful in hacking into and obtaining the information that resides from within an HR Database. The amount of information extracted is potentially significant which compromised records from July 2006 to October 2018 from previous and current employees. There was an internal Memo sent Tuesday to NASA Employees and published at spaceref.com.

NASA did mention that it will assist employees with the help from identity protection services. “The agency is continuing its efforts to secure all servers, and is reviewing its processes and procedures to ensure the latest security practices are followed throughout the agency,” a NASA spokesperson told Gizmodo.… Read the rest

Memes in Twitter can be used to inject Malware

This new malware uses Twitter to deploy Remote Access Tojans (RATs) from a image. The malware can infect vulnerable computers and collect information, take screenshots and jump to other computers to infect them as well.

Trend Micro said in their Blog Post that the malware listens for commands within the the hackers twitter account . The researchers found two tweets that are used to hide a “/print” command in the image which told the malware to take a screenshot of an infected computer. The malware then separately obtains the address where its command and control server is located from a Pastebin post, which directs the malware where to send the screenshots .

Malware’s code showing the Pastebin URL
Malware’s code showing the Pastebin URL

Read the rest

6.8M Facebook Users Private Photos Exposed

The Facebook bug allowed 1,500 apps built by 800+ developers to view unposted private photos.

Friday Facebook disclosed that a bug in the platform enabled third-party apps to access unpublished photos of millions of users.  

When your writing a new post and upload a photo but do not finish posting it Facebook will store it in the database as a draft. This gave the third party app creators access to these drafts. 

Facebook has seen many other breaches, enough is enough. I’m sure there will be a class action lawsuit. I believe the reputation of Facebook has been continually tarnished by security issues and users are deeply thinking about disabling  their accounts. 

Read the rest

Top Worst Passwords Of All Time

Take security serious, here is a lists of the top 500 worst passwords. Any password documented publicly or available in the darkweb can be used in a dictionary attack. This is a form of brute force attack technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary.
 

NOTop 1-100Top 101–200Top 201–300Top 301–400Top 401–500
1123456porschefirebirdprincerosebud
2passwordguitarbutterbeachjaguar
312345678chelseaunitedamateurgreat
41234blackturtle7777777cool
5pussydiamondsteelersmuffincooper
612345nascartiffanyredsox1313
7dragonjacksonzxcvbnstarscorpio
8qwertycamerontomcattestingmountain
9696969654321golfshannonmadison
10mustangcomputerbond007murphy987654
11letmeinamandabearfrankbrazil
12baseballwizardtiger
Read the rest

Stay Informed

Receive instant notifications when new content is released.