Nebraska AG Sues Change Healthcare over $22M Ransomware

On February 11, 2024, a highly advanced and notorious affiliate group of the BlackCat/ALPHV ransomware gang, known for its history of targeting major organizations and critical infrastructure, infiltrated Change Healthcare’s network. The attackers spent nine days inside, quietly moving through the system, stealing sensitive data, and ultimately encrypting files, demanding a ransom of $22 million. …

(Teaching Aide) PACKET FILTERING FIREWALLS

PACKET FILTERING FIREWALLS 2.0       Overview of Packet filter firewalls Packet filter firewalls are a foundational approach to network security, primarily functioning to control network access based on simple, predefined rules. It analyses data packets at the network and transport layers of the OSI model by examining packet headers and determining whether to allow or …

Walkthrough on Packet Filter firewall.

The main purpose of this project is to extensively discuss packet filter firewalls mentioned during our lectures, understand, and document the operational principles of packet filter firewalls.It also throws more insight on the types, advantages, and limitations of packet filter firewalls in network security. This project also highlighted the core functions of packet filter firewalls …

Password Managers: Saviors or Silent Threats?

Password manager is a tool that can be used to generate, store and manage passwords for different applications or websites a person uses. It requires users to only remember one master password (Alodhyani 2020). There are many pros and cons to use a password manager. Let’s take a look at some of the pros and …

(Teaching Aide) Security in Cloud Network

YouTube video of the Project (Security in Cloud Network) : https://youtu.be/Vter7O_6r6c In the world of rapid evolution, cloud computing is a heavily relied cloud based solution for industries, organizations and personal users. Cloud is used for storing, processing and managing data along with properties like scalability, cost savings, and increased accessibility. With the benefits also …

Public Wi-Fi and Security Concerns – Harshad Krishnaraj, Md. Saidul Arifin Shuvo, Shah Zaib

Teaching Aide https://www.instagram.com/cybersafecanucks According to the National Institute of Standards and Technology, Wi-Fi is a wireless local area network that provides an internet connection. A public Wi-Fi network is essentially wireless LAN provided in public spaces. Often anyone within the range can easily access the network for free or a nominal fee.  Uses of Public …

Teaching Aid – POODLE and Padding Oracle Attack

Walkthrough : https://youtu.be/E9EZ3AXqHSE Code Repository : https://github.com/HaydenMcNally/ISEC-603-Padding-Oracle History of the Padding Oracle Attack  Padding Oracle attacks, also known as Vaudenay attacks was originally published in 2002 by Serge Vaudenay. The term ‘padding oracle’ appeared in literature in 2002, after Serge Vaudenay’s attack on the CBC mode decryption used within symmetric block ciphers. The earliest well-known …

Unveiling the hidden internet -teaching aide

Case study: Onion routing, the deep and dark web and the TOR browser The internet is an incredibly vast place, but what most of us see mainly is our social media feeds, search engines, and websites is just the surface. Beneath that lies a hidden world; the deep web and the dark web. Through this …

AI & Cyberattacks

According to the International Telecommunication Union (ITU), there are 5 billion internet users in the world. This amounts to 66% of the population on planet earth. Cisco reports that they are forecasting that by 2030, there will be 29 billion networked devices driven by IoT. With such a rapid increase in technology users and devices, …