Cyber Safety Net Cyber Safety Net Cyber Safety Net Cyber Safety Net
Navigation
  • Home
  • Artificial Intelligence
  • Cybersecurity Solutions
    • x360 Recover Gets You Back in Business FAST After Disasters or Ransomware
    • Rise of Ransomware Contact
    • Disaster Recovery Test Lets You Stop Worrying
    • Ransomware Recovery Test Lets You Stop Worrying
    • HIPAA
    • Training
    • Protection
    • PCI-DSS Audit
    • 14 Ways to Protect Your Practice from a Cyber Attack
    • 14 Ways to Protect Your Business from a Cyber Attack
    • Penetration Testing Authorization
    • Red Flags of Rogue URLs
  • Blog
  • About
    • Certifications
    • Rise of Ransomware Contact
    • Contact
    • Security Contact
Still vulnerable to cyber attacks and ransomware

Successful Spear Phishing Attacks Enable DNS Hijacking

Spear phishing popular avenue for DNS hijacking On Jan. 22, 2019, the Cybersecurity and Infrastructure Security Agency (CISA), which is a part of the U.S. Department of Homeland Security (DHS), issued Emergency Directive 19-01. The title of the directive is: Mitigate DNS Infrastructure Tampering. A series of actions are required for federal agencies. Watch how targeted spear phishing has become. Here is the background: “In coordination with government and industry partners, the Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) is tracking a series of incidents involving Domain Name System (DNS) infrastructure tampering. CISA is aware of multiple executive branch agency domains that were impacted by the tampering campaign and has notified the agencies that maintain them. Using the following techniques, attackers have redirected and intercepted ... Read More
February 7, 2025Mark Anthony Germanos
The California Consumer Protection Act (CCPA) protects Californians' privacy

California Attorney General Holds Public Forum on CCPA

CCPA listening tour in full swing The California Attorney General's Office (AG) made its fourth stop on its statewide California Consumer Privacy Act (CCPA) listening tour, holding in Los Angeles a public forum on the CCPA. The forums invite public comment as the AG prepares regulations for implementing and enforcing the law. Although the AG specifically requested comment on the seven areas identified in the law for the AG’s regulation,[1] it was clear that some categories caught the attention of the public more than others. And even though the forum was structured to allow participants to provide ideas and suggestions (the AG did not respond to comments or questions presented), most commentators asked for clarity and specific direction from the AG regulations, to help decipher the reach ... Read More
February 7, 2025Mark Anthony Germanos
Cyber Safety Net - keeping you safe online.

Social Engineering Testing: Why Getting Hacked Is Good

Test your users' gullibility to social engineering Stephanie Carruthers, People Hacker for IBM- X-Force Red wrote an excellent post on why you should social engineer your own organization. I'll quote the first paragraph or so, and you should read the rest of the article, it makes an excellent point for the need to "social engineer your employees" and assess the strength of your human firewall! "It was one of the highest phishing rates I had ever seen: Almost 60 percent of employees clicked the malicious link. Yet the client, a chief information security officer (CISO) of a Fortune 100 company, asked a question that caught me completely off-guard. “So what?” he said, clearly unimpressed. As a “people hacker” for X-Force Red, IBM Security’s team of veteran hackers, I’ve performed social ... Read More
February 7, 2025Mark Anthony Germanos
Cyber Safety Net - keeping you safe online.

Online Job Offer Spreads Malware Attack at Work – via LinkedIn

LinkedIn ads used to spread malware The context of contacting the victim via LinkedIn may be all that was needed to trick one job seeker into installing malware on the network of a bank. Sometimes credible sites are avenues of malware distribution. Imagine you’re on LinkedIn and you see an ad for an open position that you’re perfect for. See anything wrong with that? Given you’re on a website that knows your job title, industry sector, location, etc. I’d say none of us would give it a second thought and assume it was legitimate. That was exactly what hackers were hoping for when they used LinkedIn ads to target employees of the victim bank (which include company as a part of their ad filtering). A bank employee responded ... Read More
February 7, 2025Mark Anthony Germanos
Watch for fake security alerts

KnowBe4 Offers Children’s Interactive Cybersecurity Activity Kit at No Cost

Cybersecurity training kids can understand KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform is offering an interactive, no-cost, children’s cybersecurity activity kit to the public. A workbook, poster and video module available to help families teach children how to protect themselves from online dangers The activity kit consists of two workbooks with puzzles and games, a poster and a video module featuring KnowBe4’s security awareness hero Captain Awareness. The workbook also includes a cyber hero pledge consisting of helpful tips to help children stay safe online, along with a family agreement that parents can review with their children to set guidelines for using online devices. Concrete tools With this activity kit, parents, teachers and other guardians have some concrete tools to help teach their children about online ... Read More
February 7, 2025Mark Anthony Germanos
Watch for fake security alerts

Watch Out! Anatova Game is Really Ransomware

Anatova game tricks users into downloading ransomware The anatova ransomware strain was discovered in a private peer-to-peer (p2p) network and targets consumers by using the icon of a game or application to trick the user into downloading it. McAfee researchers today announced the discovery of a new ransomware family, “Anatova” that is targeting consumers at scale across the globe. The ransomware was discovered in a private peer-to-peer (p2p) network and targets consumers by using the icon of a game or application to trick the user into downloading it. Creating a quick and fast piece of ransomware is fairly easy Beek, Lead Scientist & Principle Engineer at McAfee said, “Creating a quick and fast piece of ransomware is fairly easy for those with basic know-how. Ransomware packed with functionality that is also ... Read More
February 7, 2025Mark Anthony Germanos
Still vulnerable to cyber attacks and ransomware

Cyber Thieves Net $150,000 in Phishing Real Estate Scam

Phishing attack when selling a house Cyber thieves stole $150,000 from a woman during a real estate transaction last year, according to Lisa Vaas at Naked Security. Mireille Appert, a Swiss woman who lives in the United States, inherited her uncle’s house in Australia when he passed away in 2014. She fell victim to a phishing attack. In 2018, Appert decided to sell the house and got in touch with an Australian law firm, KF Solicitors, on July 1st. On July 18th, she received a phishing email that read, “The sellers [sic] authority just needs to be emailed back to us and not posted.” She emailed her bank details to the company in a PDF. Wrong bank account number Over the next month, Appert and her son worked with ... Read More
February 7, 2025Mark Anthony Germanos
Cyber Safety Net is your AI solution provider

AI’s Different Results Thwart Plagiarism Checkers

Similar AI Prompts Create Different Results - This Will Confuse Plagiarism Checkers Plagiarism checkers thwarted. I asked an AI engine to generate content yesterday. One small change in my prompt created a result with a vastly different result, tone and verbiage. Armed with this knowledge, I am arguing plagiarism checkers will not generate consistent results on AI-generated content. My client has all users logging into their Windows 11 workstations with the same password. Danger, Danger, Danger, I know. I asked perplexity to generate content I can share with the client, promoting creating user-specific passwords. My first prompt was “why should a company with 5 computer users have unique passwords for each user and in under 300 words and include bullet points and in a friendly tone and written from ... Read More
February 7, 2025Mark Anthony Germanos
Watch for fake security alerts

Social Media, Online Quizzes, and Prizes are the New Phishing

Phishing has moved above simple fake email Phishing has grown above and beyond email and into your online experience as a whole. This is an effort to collect personal details and share out the attack on social networks, according to a new report from Akamai Enterprise Threat Research. In a world where millennials have grown up with a device in their hand, inherently trusting everything they interact with on the web, cybercriminals are meeting victims where they are online, using a new type of phishing attack that gets the user to give up personal details. Users surfing the web are unexpectedly redirected to a “Congratulations” page with either a roulette-looking wheel or a 3-question quiz. It’s an attack designed to gather email addresses and personal information to be used ... Read More
February 7, 2025Mark Anthony Germanos
cyber attack detected after the fact

Chinese Hackers Use Phishing and CEO Fraud to Steal $18.6 Million

CEO fraud nets $18.6 Million A talented group of Fraudsters used phishing, social engineering, and CEO fraud to convince the India arm of Italian engineering company Tecnimont to part with millions of dollars. We’ve all heard of phishing or whaling stories where someone is sent an email pretending to be the CEO of an organization, asking the recipient to perform an action that benefits the cybercriminal. The attack on Tecnimont takes these kinds of attacks to a new level and is something right out of a Mission: Impossible movie. A series of conference calls Chinese fraudsters sent Tecnimont’s head of India operations an email from an account that spoofed that of group CEO Pierroberto Folgiero. Rather than simply asking for money to be transferred, the cybercriminals instead arranged for not one, ... Read More
February 7, 2025Mark Anthony Germanos
  • Previous
  • 1
  • ...
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • 13
  • Next

Search

Recent Posts

  • AI: Do You Feel People Who Use AI Get More Done in Less Time?
  • Facebook is free? You pay with personal information
  • You have a new social media connection request from Tom
  • LastPass manages your passwords for you
  • How Microsoft is Powering AI with Three Mile Island
  • Why use 2-Factor Authentication?
  • You have a new social media connection request from Lynne
  • AI: When people mention AI, do you feel lost?
  • You have a new social media connection request from Cassandra
  • Be smart and save money on your Internet domain renewals

© 2025. Cyber Safety Net. 3450 Palmer Drive #4-286. Cameron Park, CA 95682.
Full Disclosure: Some content here is generated by AI. The views expressed are the author's opinion and not legal advice. The author is not a lawyer. You are an adult and responsible for anything you do.