A total $31.5 million penalty has been issued against a famous telecom brand, “T-Mobile” to settle an investigation by the Federal Communications Commission (FCC) for a past series of data breaches that leaked millions of personal data. This company has reached an agreement with the US Federal Communications Commission (FCC) to give $15.75 million as …
Category Archives: Uncategorized
Deep Packet Inspection and TLS Certificates for Controlling Website Access – Teaching Aide
DPI is an essential concept and skill to exercise to help organization in enhancing the security posture, enable traffic management, and enforce policies. This teaching aide will sail through a journey, explaining what DPI is, laying out a foundation on DPI concept and shows how DPI uses the Transport Layer Security (TLS) as core technology …
The Rising Threat of Ransomware Attacks in 2024: A Case Study on Change Healthcare
In the first half of 2024, the cybersecurity industry experienced a major uptick in ransomware attacks, and companies from every sector were hit by the attacks. One such example is Change Healthcare, a UnitedHealth-owned prescription processor, which was targeted by an apocalyptic ransomware attack. This attack not only upended the healthcare system but also brought …
The multiple attacks on Internet Archive
At present, cybersecurity incidents are increasing day by day. In an unprecedented series of events, the Internet Archive, the famous Wayback Machine, faced multiple significant cyber attacks recently. These incidents have spread through the digital preservation community and raised critical questions regarding the security measures of our collective online heritage. The First Data Breach: The …
Port of Seattle Cyberattack: Rhysida Ransomware Breach and Recovery Efforts
Summary of attacks On August 24, 2024, a ransomware attack led by the Rhysida ransomware organization took over the port of Seattle. This attack severely affected critical systems at Seattle-Tacoma International Airport, including facilities, check-in areas, ticketing, Wi-Fi, passenger transport identifies exhibits in conjunction with critical disruptive services: port website, TSA wait time information, SEA …
Continue reading “Port of Seattle Cyberattack: Rhysida Ransomware Breach and Recovery Efforts”
Defense In Depth and the continuous rise of Cyber Attacks
There is a significant rise in Cyber attacks across the world, someone falls victim approximately every 11 secs and there is a 15% increase in Ransomware attack in North America in 2024. With this continuous rise in Cyberattacks it is no longer a matter of if but when you get attacked! One or two security …
Continue reading “Defense In Depth and the continuous rise of Cyber Attacks”
Alberta, and Western Canada Co-Operatives Cyber-Attack
In early July 2024, Albertans lined up at gas stations and grocery Co-Op stores. The impact was publicly realized after a formal announcement from by the Federated Co-Operatives Ltd (FCL) on the 27th of June 2024 confirming a security incident on western FLC stores. The cyber-attack widespread knocked out hundreds of Canada’s Co-Op western stores …
Continue reading “Alberta, and Western Canada Co-Operatives Cyber-Attack”
Tor’s Broken?
A recent article posted on September 19th claims to have seen evidence that German police and authorities successfully de-anonymized a Tor user which resulted in their arrest and conviction back in 2022. [3] Tor has and is still the main method for someone to anonymously access the internet and the dark web. Anonymity has made …
How Hidden Commands to AI Systems Compromise User Privacy
In recent times, there has been a significant increase in large language modeling software, specifically generative AI, as a result, many users are able to incorporate these throughout their daily usage. However, researchers and hackers have been working to find weaknesses within these AI systems, one particular category being prompt injections (Burges, 2024). This recent …
Continue reading “How Hidden Commands to AI Systems Compromise User Privacy”
The Growing Threat of AI Impersonation Fraud – Deepfakes
Imagine a world where anyone’s voice or face can be convincingly faked, blurring the line between real and fake. This is the growing threat of deepfake technology, allowing cybercriminals to impersonate people with striking resemblance. What are Deepfakes? Deepfakes are advanced synthetic media that can convincingly imitate people using altered images, audio, and videos1. The …
Continue reading “The Growing Threat of AI Impersonation Fraud – Deepfakes”