Ransomware Targets Corporate Network showing there's a new threat actor on the hacking world stage, going by the name "OldGremlin". They're causing some severe damage to corporate networks around the world. The group's malware campaign began back in March of this year (2020) and, for the moment, is centering in Russia. Of course, it would be all … [Read more...] about Ransomware Targets Corporate Network
Archives for September 2020
Veteran Affairs Data Breach
Veteran Affairs Data Breach reported a hacker successfully breaches their system making off with personal information belonging to more than 46,000 veterans served by the department. According to the Veteran Affairs breach notification, the hackers utilized social engineering techniques and exploited the authentication protocol to access the … [Read more...] about Veteran Affairs Data Breach
Staples Exposed Customer Data
Staples expose customer data when customers went to review their current and past online orders. Staples' order tracking portal allows you to enter your zip code and order number to track your package, but the order numbers are sequential. So starting with a customers' order number, a hacker could access the route of a package to the city and … [Read more...] about Staples Exposed Customer Data
Microsoft is force-installing Edge Browser
Microsoft Windows is force-installing Edge Browser with the Windows 10 systems updates. Microsoft is retiring their older versions of their Edge Browser and replacing them with the new Chromium-based Edge.3 To expunge all the older versions, the company has declared the latest Microsoft OS update to be mandatory, including the Edge browser's … [Read more...] about Microsoft is force-installing Edge Browser
Hackers access the Windows Name/Finger Communications
Hackers access the Windows Name/Finger communications protocol using it against itself to infiltrate and make off with data. John Page discovered a sneaky, unorthodox way hackers use the Name/Finger network communication protocol to exfiltrate files from a network. The Windows Name/Finger communications protocol uses a rudimentary command … [Read more...] about Hackers access the Windows Name/Finger Communications
A Flaw in Bluetooth Devices Leaves them Vulnerable
A Flaw in the Bluetooth Device protocol leaves them vulnerable. The flaw impacts any device running the Bluetooth Low Energy, "BLE" protocol. BLE is a slimmed-down of the original Bluetooth Classic standard protocol to conserve battery power while maintaining Bluetooth connections over long periods. The lightweight Bluetooth protocol is … [Read more...] about A Flaw in Bluetooth Devices Leaves them Vulnerable