• Quick! Update Your iPhone and iPad! (5/3/2021) -   Quick! Update Your iPhone and iPad! These days, your smartphones and tablets are more of extra ligaments rather than just simply devices. Monday, Apple quickly released a security update for their iPhone and iPad product lines. Furthermore, if you happen to own either an iPhone, iPad, or Apple Watch you should immediately run updates in order to install the latest security patches.  Do you need to update your iPhone, iPad, and Watch?   What Apple devices are affected? Apple released iOS version 14.5.1,iPadOS 14.5.1, and watchOS 7.4.1 on Monday.  In addition, this update comes just a week after they released versions 14.5.  The purpose of releasing this quick update… Read More
  • A Week in Security: REvil Extortion, RDP Stolen Credentials, Geico Breach, and Chrome Exploits (4/23/2021) -   A Week in Security: REvil Extortion, RDP Stolen Credentials, Geico Breach, and Chrome Exploits As we approach the weekend, let us look back at this past week at the top cyber security news.  This week in cyber security, REvil attempted to extort Apple using their stolen data.  Additionally, UAS leaked 1.3 million Windows RDP logins for sale on their marketplace.  Also in other news, Geico suffered a data breach that exposed some of their customers’ sensitive data and Google rushed to fix several zero-day exploits in Chrome.   REvil Attempts to Extort Apple Early in the week, the threat group REvil, known for their successful ransomware campaigns and living… Read More
  • 1.3 Million Windows RDP Logins Stolen and Sold on Dark Web (4/21/2021) -     1.3 Million Windows RDP Logins Stolen and Sold on Dark Web   Remote Desktop Protocol (RDP) is one of the most widely used services to remotely control other systems.  However, when left open, the system is vulnerable to complete remote control to whomever decides to access it.  Essentially, it is like the hacker is sitting right in front of the mouse and keyboard controlling the system.  Now imagine the extent and potential impact 1.3 million windows RDP logins stolen and being sold on the dark web.   The Dark Web Marketplace The actor behind the leak is known as Ultimate Anonymity Services, or UAS.  UAS is a very… Read More
  • Half a Billion LinkedIn Accounts Are Being Sold Online (4/13/2021) -   Half a Billion LinkedIn Accounts Are Being Sold Online When setting up a LinkedIn account, you enter certain information regarding yourself such as an email address, birthday, schooling, work experience.  This information and platform allows you to network with others like yourself.  However, even though this information you enter can be publicly accessible, attackers can still find a way to profit or exploit social engineering attacks using it.  Recently, over half a billion LinkedIn accounts are being sold online after attackers scraped and compiled the data.   The Attack Attackers posted personal data, scraped from over 500 million LinkedIn profiles for sale.  To prove that they were successful in… Read More
  • The Second Largest Ransomware Attack In History (4/2/2021) -   The Second Largest Ransomware Attack In History   Suffering from a ransomware attack can be devastating in itself.  Operations and systems become disabled, workflow stops, not to mention the financial loss and exfiltration of your sensitive data.  Companies are usually the high value targets because of the huge financial gain an attacker can achieve.  However, local townships and schools generally do not possess the greatest security countermeasures, making them easy pickings.  Recently, the Broward County Public School system became the victim of the second largest ransomware attack in history.   Broward County Public School System Located in Florida, the Broward County Public School (BCPS) is the second largest school… Read More
  • BYOB? What about BYOD? (3/19/2021) - BYOB? What about BYOD? Generally, no company ever lets employees bring in their own beer, but what about their own devices?  The IT field consistently debates whether or not an employee should be permitted to use their own personal devices or be mandated to those provided by their employers.  In the scheme of things, security concerns battle the increased productivity and money saved, however, as the world becomes more tech-oriented, how will workplaces respond to BYOD?   Cost-Benefit Analysis First and foremost, BYOD policies create an annual cost savings opportunity for businesses.  For small businesses struggling through recent times, saving any amount of money can greatly help the business’s mission. … Read More
  • What is a Sim Swapping Attack? (3/15/2021) -   What is  a Sim Swapping Attack?   You just set up multi-factor authentication (MFA) to further protect your online bank account.  Success! No one else can log into your bank accounts without your phone…right?  By performing a Sim Swapping attack, can gain access to your MFA,   Sim Swapping Attack Through exploiting social engineering, attackers perform sim swapping attacks.  An attacker contacts the victim’s wireless phone service provider (AT&T, Verizon, T-Mobile, etc.),  and then proceeds to convince, sometimes bribe, or even trick them into believing the attacker is the authentic user. Now, the attacker can request to assign your phone number to a new sim card or phone.  These… Read More
  • What is Cryptojacking? (3/11/2021) -     What is Cryptojacking?   With any opportunity to make a monetary gain, criminals will always commit malicious activities to get an advantage, cheat, or even steal for their own benefit.  Cryptocurrency and mining is no different.  Mining crypto presents an opportunity to make money, profit, and invest.  However, like any other financial opportunities, attackers exploit others to acquire crypto mining resources to mine, or cryptojacking.  What is cryptojacking?   Cryptojacking For an attacker to use other systems for cryptocurrency mining, they must gain access into a system like any other attack.  However, this form of attack is called “Cryptojacking.”  Cryptojacking can be defined as malicious cryptocurrency mining using… Read More
  • Microsoft Exchange Server Exploits (3/3/2021) -   Microsoft Exchange Server Exploits   Recently, Microsoft teams scrambled together to push out patches for multiple zero-day vulnerabilities on Microsoft Exchange Server exploits.  Attackers were able to exploit these vulnerabilities to gain remote control over the servers to steal email accounts, install malware or exfiltrate data.   The Attack To be able to exploit the vulnerabilities, there must be an open 443 port for the Microsoft exchange servers.  From there, the attacker or group can exploit four different vulnerabilities which include: CVE-2021-26855: Server Side Request Forgery vulnerability that permits attackers to send HTTP requests and authenticate themselves as the Microsoft Exchange Server CVE-2021-26857: Deserialization vulnerability that allows attackers to… Read More
  • Mac’s Newest Malware: Silver Sparrow (2/22/2021) -   Cyber Protection Group hopes everyone stays warm, safe, and secure during this large winter storm!   Mac’s Newest Malware: Silver Sparrow Apple released a new line of macs which include their newly developed M1 processors.  However, attackers took no time at all to develop malware to run on these systems.  Recently, nearly 30,000 macs have been discovered harboring a piece of malware named, “Silver Sparrow.”   Mac Processors Until now, Apple used other manufacturers’ processors in their systems.  For the first time, Apple implemented their own manufactured processors into their newest lines of computers.  Named the M1 chip, Apple’s website claims “it delivers incredible performance, custom technologies, and revolutionary… Read More