Jun 21 2020

Digital Downfall: Technology, Cyberattacks and the End of the American Republic

Category: Cyber Attack,HackingDISC @ 1:34 pm

Digital Downfall: Technology, Cyberattacks and the End of the American Republic…

Source: Digital Downfall: Technology, Cyberattacks and the End of the American Republic:

Is America on the brink of civil war?

Could foreign cyber plots turn Americans against one another and cause a disastrous domestic conflict?

What would happen if the lights went out and the technology we rely upon to run American life is no longer available?

The present dangers are real. The US is more vulnerable to destructive foreign interference today than it has been in over a century. As Russia and China realize they can’t win shooting wars against the US, they have devised new and cunning ways to destabilize American politics and cripple the US economy. Cyber meddling in elections, disinformation campaigns, abuse of social media to widen racial and political divides, and the theft of military data are just some of the malicious acts threatening the Republic. Digital Downfall examines the potential effects of such attacks, with a look at:

  • The vulnerability of the US to cyber attack
  • American technological weaknesses that could be exploited by our enemies
  • How the US military could be affected by cyberwar
  • The possibility that the American Republic we know could be destroyed
  • America’s relationship with racism
  • What the future may hold

And more…The dangers posed by external sources can only be real when the internal politics of the United States is in a fragile state. The past four years bear testimony to this political decline as does every passing day of the Trump presidency.The perfect storm of external interference, a rampant and deadly pandemic, and a culture of racism that will no longer be tolerated is upon us.Who knows where it will lead to, or what will be left at the end.

Digital security – threats, risks and how to protect yourself
httpv://www.youtube.com/watch?v=QbyAVsbtGh0

How to protect your online privacy in 2020 | Tutorial
httpv://www.youtube.com/watch?v=jxeeKKfjb5o

Take an awareness quiz to test your basic cybersecurity knowledge

Download a Security Risk Assessment steps paper!

Download a vCISO template

Subscribe to DISC InfoSec blog by Email

Tags: Digital Downfall


Jun 04 2020

Hackers steal secrets from US nuclear missile contractor

Category: Hacking,Information SecurityDISC @ 1:15 pm

Cyber extortionists have stolen sensitive data from a company which supports the US Minuteman III nuclear deterrent.

Source: Hackers steal secrets from US nuclear missile contractor

Download a Security Risk Assessment steps paper!

Subscribe to DISC InfoSec blog by Email


May 30 2020

Microsoft IIS servers hacked by Blue Mockingbird to mine Monero

Category: HackingDISC @ 12:01 am

This month news broke about a hacker group, namely Blue Mockingbird, exploiting a critical vulnerability in Microsoft IIS servers to plant Monero (XMR) cryptocurrency miners on compromised machines.

Source: Microsoft IIS servers hacked by Blue Mockingbird to mine Monero






Download a Security Risk Assessment Checklist paper!

Subscribe to DISC InfoSec blog by Email


May 29 2020

It’s not every day the NSA publicly warns of attacks by Kremlin hackers – so take this critical Exim flaw seriously

Category: HackingDISC @ 11:19 am

GRU crew actively exploit hole – but you it patched months ago, right?

Source: It’s not every day the NSA publicly warns of attacks by Kremlin hackers – so take this critical Exim flaw seriously



Russian hackers stole NSA data
httpv://www.youtube.com/watch?v=8KGkdeM8OHk

Inside Russia’s Hacker Underworld
httpv://www.youtube.com/watch?v=GWKB2AeUR04

HBO What to Do About Cyberattacks
httpv://www.youtube.com/watch?v=q1lKHmY7DOY







Get a Cyber Aware Cheat Sheet now!

Download a Security Risk Assessment Checklist paper!

Subscribe to DISC InfoSec blog by Email


Apr 26 2020

Blue Team Cheat Sheets

Category: Blue team,Cheat Sheet,cyber security,HackingDISC @ 3:47 pm

Cyber Security Fundamentals: What is a Blue team?

Open a PDF file The best practice guide for an effective infoSec function.

Blue Team Cheat Sheets

Subscribe to DISC InfoSec blog by Email

Tags: Blue team, Red team


Jun 15 2019

Chinese spies stole NSA hacking tools, report finds

Category: Hacking,Security ToolsDISC @ 4:01 pm

In the report, the cybersecurity company Symantec claims that a Chinese hacker group associated with Chinese government intelligence conducted a hacking campaign using a tool that at the time was only known to be the property of the NSA.

Source: Chinese spies stole NSA hacking tools, report finds


Enter your email address:

Delivered by FeedBurner





Jun 09 2019

From phish to network compromise in two hours: How Carbanak operates

Category: Hacking,Phishing,Security BreachDISC @ 2:21 pm

Cybercriminal group Carbanak has stolen hundreds of millions of dollars from financial institutions. Here’s a detailed analysis by Bitdefender of an attack on one bank.

Source: From phish to network compromise in two hours: How Carbanak operates







May 29 2019

Flipboard says hackers stole user details | ZDNet

Category: Cyber Attack,Hacking,Security BreachDISC @ 12:16 pm

Extent of the hack is unknown, but Flipboard said hackers had access to its systems for almost nine months.

Source: Flipboard says hackers stole user details | ZDNet

Flipboard confirms database hack, resets all user passwords

  • InfoSec Breaches

  •  Subscribe in a reader





    May 12 2019

    Hacking the ‘Unhackable’ eyeDisk USB stick with Wireshark

    Category: HackingDISC @ 9:09 pm

    The paradox, the USB stick eyeDisk that uses iris recognition to unlock the drive could reveal the device’s password in plain text in a simple way.

    Source: Hacking the ‘Unhackable’ eyeDisk USB stick with Wireshark


     Subscribe in a reader





    Mar 23 2019

    Python Cheat Sheets

    Category: Cheat Sheet,Hacking,Python,Security ToolsDISC @ 8:59 pm

    Beginner’s Python Cheat Sheet

    Python Crash Course – Cheat Sheets






    Mar 03 2019

    Hacking with BeEf – Stealing Social Media Credentials

    Category: Hacking,Web SecurityDISC @ 11:28 am

    BeEF [Browser Exploitation Framework] is a penetration testing tool which focuses strongly on the web browsers. BeEF passes the hardened network perimeters.

    Source: Hacking with BeEf – Stealing Social Media Credentials


    Enter your email address:

    Delivered by FeedBurner





    Mar 01 2019

    Did you hear the one about Cisco routers using strcpy insecurely for login authentication? Makes you go AAAAA-AAAAAAArrg *segfault*

    Category: Hacking,Security patchingDISC @ 3:18 pm

    RV110W, RV130W, RV215W need patching to close remote hijacking bug

    Source: Did you hear the one about Cisco routers using strcpy insecurely for login authentication? Makes you go AAAAA-AAAAAAArrg *segfault*


    Enter your email address:

    Delivered by FeedBurner





    Feb 27 2019

    Thunderclap flaws allow hacking most of modern computers

    Category: HackingDISC @ 12:41 pm

    Researchers found a new set of flaws that can be exploited via Thunderbolt to compromise a broad range of modern computers with Thunderclap attacks

    Source: Thunderclap flaws allow hacking most of modern computers






    Feb 26 2019

    Senators want Huawei equipment removed from US power grid because of security concerns

    Category: Cyber War,HackingDISC @ 12:21 pm

    Huawei may well be causing excitement with its foldable smartphone, the Mate X, but the company’s troubles in the US continue. The American government has already banned the use of some Huawe…

    Source: Senators want Huawei equipment removed from US power grid because of security concerns






    Feb 26 2019

    Beef : The Browser Exploitation Framework Project

    Category: Hacking,Web SecurityDISC @ 12:02 pm

    BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.Amid growing concerns about web-borne

    Source: Beef : The Browser Exploitation Framework Project






    Feb 17 2019

    Vulnerability In Xiaomi Electric Scooters Could Allow Remote Attacks

    Category: cyber security,Hacking,Mobile SecurityDISC @ 5:32 pm

    A researcher has discovered a serious vulnerability in Xiaomi electric scooters. Exploiting the flaw could allow remote attacks on it causing sudden breaks.

    Source: Vulnerability In Xiaomi Electric Scooters Could Allow Remote Attacks


    DISC InfoSec blog

    ↑ Grab this Headline Animator





    Feb 12 2019

    Are Hackers Winning The Denial Of Service Wars?

    Category: Cyber War,HackingDISC @ 2:01 pm

    DDoS attacks may not be the quickest route to profitability for bad actors, but given the importance of this attack technique to nation-state cyberwar adversaries, we can expect continued innovation on the part of the hackers. Enterprises cannot afford to relax their efforts to combat such attacks.

    Source: Are Hackers Winning The Denial Of Service Wars?





    Tags: DoS


    Feb 11 2019

    Blue Monday in infosec: 620 million accounts across 16 hacked websites now for sale on dark web, seller boasts

    Category: HackingDISC @ 10:03 pm

    Dubsmash, Armor Games, 500px, Whitepages, ShareThis, and more said to be up for grabs for $$$s in BTC

    Source: Blue Monday in infosec: 620 million accounts across 16 hacked websites now for sale on dark web, seller boasts

    DISC InfoSec blog

    ↑ Grab this Headline Animator




    Tags: hacked websites


    Feb 04 2019

    Metro Bank is the first bank that disclosed SS7 attacks

    Category: Hacking,Mobile SecurityDISC @ 11:04 am

    Metro Bank has become the first major bank to disclose SS7 attacks against its customers, but experts believe it isn’t an isolated case.

    Source: Metro Bank is the first bank that disclosed SS7 attacks

    DISC InfoSec blog

    ↑ Grab this Headline Animator





    Tags: ss7 hack


    Feb 03 2019

    Bolt : Cross-Site Request Forgery Scanner Tool 2019

    Category: Hacking,Linux SecurityDISC @ 12:07 pm

    Bolt is in beta phase of development which means there can be bugs. Any production use of this tool discouraged. Bolt crawls the target website

    Source: Bolt : Cross-Site Request Forgery Scanner Tool 2019

    DISC InfoSec blog

    ↑ Grab this Headline Animator






    « Previous PageNext Page »