Tag Archive for: hacking

Investing In Secular Trends: Hacking And Cybersecurity


Microchip processing data through computer motherboard circuit

Black_Kira/iStock via Getty Images

As our digital footprints grow at an exponential rate and become more accessible from anywhere on Earth, and on multiple platforms, it is more important than ever to protect our data. Businesses and individuals alike are becoming more vulnerable to outside and nefarious actions by those that can exploit private and sensitive information for financial gain or to cause disruptions. I believe that this activity will continue for the foreseeable future (measured in years and decades) and is likely to become more top of mind for corporate America as well as individuals.

Cybersecurity is not a new term or new concern by any means, but I believe that the prevalence of hacks and need for robust protection will be a secular trend, driven by the exponential growth in data. I characterize a secular trend as one that continues despite business cycles, political environments, interest and inflation rates, and other factors, including most exogenous shocks. Companies experiencing secular growth provide pockets of opportunity during the current period of stock market uncertainty, rising interest rates, commodity volatility driven by supply/demand imbalances, and logistical issues. Clearly, there are limits to this description. Another pandemic or world war would certainly be expected to derail most trends, cyclical or secular.

Growing Vulnerabilities And Opportunities

Economic disruptions, logistical challenges, and supply chain bottlenecks contributed to the creation of new vulnerabilities for adversaries (i.e., hackers) to exploit. The growing number of leaks and attacks in recent years supports the thesis that adversaries place a high value on data, control of assets, and collecting ransoms when possible. Attackers are increasingly avoiding the use of malware to breach systems and steal information, instead seeking legitimate administrator credentials to gain access to target assets and data. This strategy helps the adversaries avoid detection by legacy antivirus products that are ill-equipped to prevent or stop this activity. In 2021, there was a 45% increase in “interactive intrusion campaigns” according to CrowdStrike’s (CRWD) 2022 Global Threat…

Source…

How I became a leading Red Teamer {and Cyber Security Expert} | @byt3bl33d3r Marcello Salvati



Russian hacking in Ukraine has been extensive and intertwined with military operations, Microsoft says


“Russia’s use of cyberattacks appears to be strongly correlated and sometimes directly timed with its kinetic military operations,” said Tom Burt, a Microsoft vice president.

The Microsoft report is the most comprehensive public record yet of Russian hacking efforts related to the war in Ukraine. It fills in some gaps in public understanding of where Russia’s vaunted cyber capabilities have been deployed during the war.
Burt cited a cyberattack on a Ukrainian broadcast company on March 1, the same day as a Russian missile strike against a TV tower in Kyiv, and malicious emails sent to Ukrainians falsely claiming the Ukrainian government was “abandoning” them amid the Russian siege of the city of Mariupol.

Suspected Russian hackers “are working to compromise organizations in regions across Ukraine,” and may have been collecting intelligence on Ukrainian military partnerships many months before the full-scale invasion in February, the Microsoft report says.

Russia’s military attacks on Ukraine sometimes “correlate with cyberattacks, especially when it involves attacks on telecom infrastructure in some areas,” Victor Zhora, a senior Ukrainian government cyber official, told reporters Wednesday.

In the weeks after Russia’s latest invasion of Ukraine, some pundits and US officials were surprised that there hadn’t been more noticeably disruptive or debilitating Russian cyberattacks on the country. Possible explanations ranged from disorganization in Russian military planning to hardened Ukrainian defenses, to the fact that bombs and bullets take precedence over hacking in wartime.

But a barrage of alleged Russian and Belarusian hacks aimed at destabilizing Ukraine has indeed taken place, with some hacks emerging weeks after they took place. Some hacking attempts have been more successful than others.

A multi-faceted cyberattack at the onset of the war knocked out internet service for tens of thousands of satellite modems in Ukraine and elsewhere in Europe; US officials are investigating the incident as a potential Russian state-sponsored hack, CNN previously reported.
Earlier this month, a Russian military-linked hacking group targeted a Ukrainian power substation in a hack that, had it…

Source…

Hacking Viruses Cause Criminal Activites


“hacking” is frequently used interchangeably with “illegal computer access.” Hacking originated in the 1950s when a gang of phreaks (short for “phone freaks”) began to take over portions of the world’s telephone networks (Britannica, 2019). 

However, Hacking can be done in many ways, such as when you get phishing emails from unknown senders or children entering data while equipping cheap assignments UK or even any other part of the world or making online payments. Although, Hacking isn’t always considered criminal conduct. A computer hacker can be someone who understands how to get beyond a device’s or software’s limits. Ethical hackers frequently break into computer systems with permission to uncover flaws and improve security. When offenders get access to systems without the owner’s authorization, this is known as Hacking.

Types of Computer Hackers

The efforts of hackers have influenced every area of cyberspace. Hackers take advantage of flaws in security systems and computer applications to gain illegal access. The hacker’s personality determines what they do with that access. White hats and black hats are the two most common categories of hackers. A vast range of different hacker types has arisen from these origins.

White Hats

White hats, although being hackers, are the good people. White hats are skilled IT specialists businesses hire to evaluate their cybersecurity measures against the attack and report any flaws. White hats seek to improve overall computer and Internet security. White hats are professionals in the only type of Hacking that is considered a legitimate business. They are used by governments, private companies, and nonprofit organizations to protect sensitive data.

Black Hats

On the other hand, Black-hat hackers are motivated by the possibility of self-gain or enjoyment. Black hats, often known as crackers, exploit flaws in systems to steal data for theft or resale. Black hats are also responsible for the…

Source…