Here is an excellent article from The Conversation, by Amro Al-Said Ahmad, looking at the vulnerabilities of cloud computing and infrastructure. How we’re using ‘chaos engineering’ to make cloud computing less vulnerable to cyber attacks (theconversation.com) Your Takeaway Many times, when I am involved with an IT and Cyber Security …
Available for sale – a toolkit to steal credentials
AlienFox is a malicious modular toolkit that threat actors can buy via a private Telegram channel. New AlienFox toolkit steals credentials for 18 cloud services (bleepingcomputer.com) The malware can be configured to scan for misconfigured servers and steal authentication details and credentials for a range of popular cloud-based services such …
Continue reading “Available for sale – a toolkit to steal credentials”
The traditional hack – a smash and grab raid on the confidential data of a computer game company
WE speak a lot about ransomware, malware and phishing attacks – but sometimes a cyber attack is just, defeat the security and grab the data. This is what has happened to the computer game developer Rockstar. Grand Theft Auto VI footage leaked after hack, developer Rockstar confirms – BBC News …
Mega issues a security update
Following this story, earlier this week, about the privacy focused cloud storage company Mega: If Mega cannot decrypt your files, don’t worry hackers can… – Smart Thinking Solutions There is an update on Bleeping Computers: MEGA fixes critical flaws that allowed the decryption of user data (bleepingcomputer.com) Which is better …
If Mega cannot decrypt your files, don’t worry hackers can…
Mega is a popular cloud storage service – with over 250million users. A minimum requirement for any cloud storage service is that the data at rest in their data centres must be encrypted. It seems that Mega’s is not, even though their own publicity states your data will be safely …
Continue reading “If Mega cannot decrypt your files, don’t worry hackers can…”