Cyber Safety Net Cyber Safety Net Cyber Safety Net Cyber Safety Net
Navigation
  • Home
  • Artificial Intelligence
  • Cybersecurity Solutions
    • x360 Recover Gets You Back in Business FAST After Disasters or Ransomware
    • Rise of Ransomware Contact
    • Disaster Recovery Test Lets You Stop Worrying
    • Ransomware Recovery Test Lets You Stop Worrying
    • HIPAA
    • Training
    • Protection
    • PCI-DSS Audit
    • 14 Ways to Protect Your Practice from a Cyber Attack
    • 14 Ways to Protect Your Business from a Cyber Attack
    • Penetration Testing Authorization
    • Red Flags of Rogue URLs
  • Blog
  • About
    • Certifications
    • Rise of Ransomware Contact
    • Contact
    • Security Contact
cyber attack detected after the fact

Scammers Exploit Hijacked GoDaddy Domains in Phishing Attacks

Scammers using hijacked GoDaddy domains to launch large-scale spam campaigns GoDaddy took steps in January, 2019 to address the authentication flaw exploited by the attackers, according to Brian Krebs. Krebs first reported on the authentication weakness on January 22nd, when he outlined two massive spam campaigns during 2018 that were very successful at getting into people’s inboxes. Their success was due to the fact that the emails were sent through trusted but dormant domains, many of which were registered and owned by Fortune 500 companies. Anti-spam researcher Ron Guilmette discovered that nearly all of these domains had used GoDaddy’s DNS service at some point. The scammers had realized that they could add domains to their GoDaddy accounts without proving that they owned the domains. GoDaddy quickly addressed the ... Read More
February 7, 2025Mark Anthony Germanos
Still vulnerable to cyber attacks and ransomware

Understanding Ransomware and Its Impact on Businesses

The Rising Threat of Ransomware In recent years, ransomware attacks have emerged as one of the most significant cybersecurity threats to businesses worldwide. These attacks involve malicious software that encrypts a victim's files. This renders them inaccessible until a ransom is paid to the attacker. The financial and operational disruptions caused by ransomware can be severe, often leading to significant data loss, reputational damage, and costly downtime. I introduced the concept at https://youtu.be/qTk4I67no7s. Lessons from Notorious Attacks One of the most notorious attacks was the WannaCry outbreak in 2017, which affected hundreds of thousands of computers across the globe. This incident served as a wake-up call for businesses. It highlighted the critical need for robust cybersecurity measures and a comprehensive disaster recovery plan. To protect your business from ... Read More
February 7, 2025Mark Anthony Germanos
The California Consumer Protection Act (CCPA) protects Californians' privacy

California Consumer Privacy Act Signed Into Law – Everything Changes

European-level GPDR becomes California law in CCPA Governor Brown signed into law California Assembly Bill 375, the California Consumer Privacy Act of 2018 (CCPA) in June, 2018. The law is new in the United States. It applies European-level compliance obligations akin to the now infamous General Data Protection Regulation (GDPR). The CCPA law takes effect on January 1, 2020. What CCPA means for organizations doing business in California CCPA includes new disclosure requirements, consumer rights, training obligations, and potential penalties for noncompliance, among other things. Below are some of the key provisions:  Right to Transparency – Similar to the GDPR, the law creates a right to transparency regarding personal information. The law defines personal information very broadly, also like the EU definition, to include information that identifies, relates to, describes, is capable of being associated with, or could ... Read More
February 7, 2025Mark Anthony Germanos
social engineering

Social Engineering Scams Gain Credibility on Wikipedia

Social engineering on Wikipedia Social engineering scammers are selectively editing Wikipedia pages. These lend credibility to tech support scams, according to Rob VandenBrink at the SANS Internet Storm Center. The Wikipedia page for the SpyEye banking Trojan was changed in mid-December to include a typo-ridden paragraph which claims that only three tech companies can remove the malware, and that “Best buy, Geek squad, Office Depo will not be able to fix it at all.” <sic> VandenBrink says that the scammer made these edits to convince victims that “only we can help you fix this (fake of course) infection you have on your computer.” The edit history of the Wikipedia user who made the changes shows that the account made similar edits to the “Macro virus” Wikipedia page, ... Read More
February 7, 2025Mark Anthony Germanos
The California Consumer Protection Act (CCPA) protects Californians' privacy

California Passes New Connected Device Cybersecurity Law

You can’t have privacy without security California clearly agrees and may test the applicability of Larry Page's advice with new legislation signed by California Governor Brown in September, 2018. Internet of Things legislation takes effect 1/1/2020 With the ink barely dry on the infamous California Consumer Privacy Act (the CCPA)—a first-of-its-kind data privacy bill in the United States—Brown signed a new Internet of Things cybersecurity bill into law, SB 327. Perhaps not so coincidentally, both laws will take effect on January 1, 2020, marking a substantial compliance deadline for technology companies big and small. SB 327 will require that a manufacturer of a “connected device” equip the device with a defined minimum amount of security. “Connected device” is defined quite broadly and as written encompasses “any device, or other physical ... Read More
February 7, 2025Mark Anthony Germanos
University of North Carolina phished its own employees

Employers Routinely Phish Their Own Employees to Test Vulnerability

In-house phishing tests identify at-risk users As compliance mandates and consumer privacy laws get tougher, businesses are taking matters into their own hands, launching internal phishing attacks to identify at-risk users. Phishing remains a profitable tactic for cybercriminal organizations. The ability to gain access to internal systems, compromise credentials, or convince a user to wire money is well within the cybercriminals reach, accomplishing these attack results and more on a daily basis. Organizations like UNC Health Care in Chapel Hill, NC receive over 91 million suspicious emails a every quarter, with a little more than 8 million still getting past security scanners. Even with 30,000 employees, that still represents an average of about 4 phishing emails a day per user. University of North Carolina sends 3,000 phishing tests a ... Read More
February 7, 2025Mark Anthony Germanos
sextortion

Sextortion Phishing Scam Seeks to Embarrass Victims

Sextortion is the newest cyber crime Sextortion scam emails are circulating. They claim that a popular adult site has been hacked, allowing an attacker to record videos of you through your webcam, according to Lawrence Abrams at BleepingComputer. The attacker claims that these videos will be sent to all of the victim’s contacts unless the victim pays the equivalent of $969 to the attacker’s Bitcoin address. The emails also include a victim’s old password obtained from a past data breach in an attempt to frighten the victim. Victims Additionally, some of the emails contain links, supposedly leading to sample videos of the victim as proof of the attacker’s claims. These links have been known to install malware, such as ransomware, in past campaigns. BleepingComputer observes that the Bitcoin address in ... Read More
February 7, 2025Mark Anthony Germanos
Perplexity.AI lets you follow-up prompts.

and and and Perplexity.AI and and and

Use and in your AI prompt chain to refine the responses You can use and in your AI prompts to refine the responses your favorite AI engine gives you. I am using Perplexity.AI, which lets you follow-up prompts. You may prompt Perplexity “tell me the 10 largest cities in the United States,” get the response and follow-up with “and tell me each city’s population from the 2020 census.” CIA Triad in Cybersecurity Let’s step into the world of cybersecurity. I am showing how to tweak Perplexity AI’s response to “Tell me about the CIA Triad in cybersecurity.” Perplexity. AI replies with: The CIA Triad is a fundamental model in cybersecurity, representing three core principles: Confidentiality, Integrity, and Availability. These principles guide the development and implementation of security policies and ... Read More
February 7, 2025Mark Anthony Germanos
Kroger's AI-driven dynamic pricing raises prices for loyal customers.

Kroger’s AI-driven Dynamic Pricing Enables Corporate Greed

Kroger's AI-Driven Dynamic Pricing Overview Kroger is implementing AI-driven dynamic pricing. You walk into a Kroger grocery store, go to an aisle with a product you buy often, cameras detect your face and raise prices. Scary? Yes. True? Yes. I am sharing quotes from https://www.perplexity.ai/page/kroeger-s-new-dynamic-ai-prici-yYXqe_z4SkOZq62JYBnVUQ. “The system, which allows for real-time price adjustments based on factors such as demand and customer data, has been presented by Kroger as a way to enhance the customer experience…” Kroger argues, or wants us to believe, detecting when we are about to buy something we buy often and then adjusting the price according, is good for us. I call BS on that. This article further reports: “Moreover, the Enhanced Display for Grocery Environment (EDGE) system allows Kroger to build detailed customer ... Read More
February 7, 2025Mark Anthony Germanos
Still vulnerable to cyber attacks and ransomware

Fake Meeting Request is a Password-Stealing Phishing Attack

Phish attack meeting requests A widespread phishing campaign is targeting executives across a number of industries. The messages ask to reschedule a board meeting in an effort to steal logins and passwords. Spotted by researchers at security firm GreatHorn, the phishing messages spoof the name and email address of the CEO of the company being targeted and uses a subject line including the company name and a note about the meeting to gain the attention of potential victims. Users are more likely to fall for attacks they believe to come from their boss. The contents of the phishing email is simple: it says a board meeting has been rescheduled and asks users to take part in a poll to choose a new date. Office 365 If users click the link, they're taken to a ... Read More
February 7, 2025Mark Anthony Germanos
  • Previous
  • 1
  • ...
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • Next

Search

Recent Posts

  • AI: Do You Feel People Who Use AI Get More Done in Less Time?
  • Chinese Hackers Use Phishing and CEO Fraud to Steal $18.6 Million
  • Watch out for these deceptive phishing attack subject lines
  • AI: Do you want to learn AI now and stay ahead of the curve?
  • $1.7 Million dispute because of social engineering fraud
  • The Top 10 Big Risks From a 10,000 Foot Viewpoint
  • Tax Season is Approaching. Watch Out for Office 365 Phish Attacks
  • It Only Takes 1 Phish Attack: Just Ask Wichita State University Employees
  • Security Awareness Training is the Key to a Culture of Cybersecurity
  • New Password Exposure Test Identifies Your Cybersecurity Risk

© 2025. Cyber Safety Net. 3450 Palmer Drive #4-286. Cameron Park, CA 95682.
Full Disclosure: Some content here is generated by AI. The views expressed are the author's opinion and not legal advice. The author is not a lawyer. You are an adult and responsible for anything you do.