• Home
  • About
  • Definitions/Glossary
  • Social
    • Twitter
    • Instagram
    • Clubhouse
Cybersecurity Is Sexy!

Bringing cybersecurity awareness to the masses!! DO YOUR PART. #BECYBERSMART

  • Home
  • About
  • Definitions/Glossary
  • Social
    • Twitter
    • Instagram
    • Clubhouse
  • Home
  • About
  • Definitions/Glossary
  • Social
    • Twitter
    • Instagram
    • Clubhouse

No Widgets found in the Sidebar Alt!

  • News

    Russian Hackers Abusing VPNs to Hijack Accounts, U.S. and British Officials Say

    July 1, 2021 /

    According to an article in Reuters, Russian hackers are accused of abusing VPNs. US and British authorities identify Unit 26165, the arm of Russia’s military spy agency, also accused of interfering in the 2016 US presidential election, as a source behind “widespread, distributed and anonymized brute force access attempts against hundreds of government and private sector targets”. None of the targets, mostly in the United States and Europe, were identified by name, but “included government offices, political parties, energy companies, law firms and media organizations”. “Russian hackers are abusing VPNs to hijack accounts, US and UK officials say” via Reuters

    read more
    Admin 0 Comments

    You May Also Like

    News & Notes: Print Spooler Vulnerability

    July 5, 2021

    News & Notes: July 9th, 2021

    July 9, 2021

    News & Notes: July 29, 2021

    July 29, 2021
  • Cybersecurity

    How Was Colonial Pipeline Hacked/Breached? Because of One Single Employee’s Compromised Password?

    June 14, 2021 /

    That’s all it takes, and usually what it comes down to. Passwords. As the founding contemporary lyrical wordsmith members of Wu-Tang would say, “Protect ya neck!“. Because without it, you’ll lose your head. Same with passwords! Protect ya passwords!!! All a malicious actor would need is a password to an account, and just like that (*finger snap!*), you’ve invited them in, like welcoming Count Dracula through your front door for Sunday dinner. So, Colonial, right…here’s the latest. After an analysis of the cyberattack on Colonial Pipeline, investigators suspect that hackers obtained the password from the dark web (think a marketplace for illicit activity) where such info is available for the…

    read more
    Admin 0 Comments

    You May Also Like

    What are the Different Types of Computer Networks?

    June 22, 2021

    News & Notes: Kaseya Suffers Massive REvil Ransomware Attack Over Weekend

    July 5, 2021

    How to Get Into Cybersecurity with No Experience [Video]

    June 18, 2021
  • Home
  • About
  • Definitions/Glossary
  • Social
Ashe Theme by WP Royal.