Posted on

SEC “X” Account Hacked Briefly Before Bitcoin EFT Approval

1382460371000 64458CS006 SEC UNDER FIR1

the staff of the Ridgewood blog

Ridgewood NJ, The U.S. Securities and Exchange Commission (SEC) confirmed that its X account, responsible for deciding on the approval of bitcoin ETFs, experienced a compromise, as reported to CoinDesk by Nikhilesh De and Krisztian Sandor. The SEC clarified that it had not granted approval for bitcoin ETF applications, contradicting a brief statement posted on its compromised X (formerly Twitter) account.

Continue reading SEC “X” Account Hacked Briefly Before Bitcoin EFT Approval

Posted on

Protecting Your Business: Essential Cybersecurity Measures for Small Businesses

external content.duckduckgo 15 scaled

In today’s digital age, the increasing reliance on technology in the business world is undeniable. However, this comes with its own set of risks, particularly in the realm of cybersecurity. Small businesses, with their often limited resources, are especially vulnerable. This article will guide you through essential cybersecurity measures that every small business should consider to protect their operations and reputation.

Continue reading Protecting Your Business: Essential Cybersecurity Measures for Small Businesses

Posted on

How Does A Virtual Private Network (VPN) Work? A Complete Explication

vpn g48d544c15 1920

A VPN is an ever-evolving network technology that hides your identity, location, and data on the web — protecting your security as you surf. But just what is a VPN? How does it work? And why do so many people use them today? This comprehensive blog post will explain everything about them.

Continue reading How Does A Virtual Private Network (VPN) Work? A Complete Explication

Posted on

NortonLifeLock Suffers Data Breach

external content.duckduckgo 49
the staff of the Ridgewood blog
Ridgewood NJ, Reusing passwords for multiple accounts can lead to password compromise, unauthorized account access, cyberattacks, and data breaches. Gen Digital, formerly Symantec Corporation and NortonLifeLock, notified customers of breached Norton Password Manager accounts in credential stuffing attacks as a result of compromised accounts on other platforms. NortonLifeLock believed an unauthorized third party acquired username and password combinations from the dark web around December 1 and utilized them in bulk to gain access to Norton accounts, which was detected after an unusually large number of failed login attempts on December 12. The credential stuffing attacks compromised thousands of accounts with potential access to first names, last names, phone numbers, mailing addresses, and possibly data stored in private vaults. This information could be used to compromise other accounts, steal digital assets, reveal secrets, and more. NortonLifeLock reset passwords for impacted accounts, advised enabling MFA, and offered a credit monitoring service. Impacted users who suspect their personally identifiable information (PII) has been compromised should review the Identity Theft and Compromised PII NJCCIC Informational Report for additional recommendations and resources.

Continue reading NortonLifeLock Suffers Data Breach

Posted on

Stopping Your “Smart TV” From Spying on you

T3ZXDLNTFZJN7KTR3U2EF6KOXE 2402051457

the staff of the Ridgewood blog

Ridgewood NJ, during the holiday season, many individuals will be gifted a connected or Internet of Things (IoT) device – such as a smart TV, camera, home security system, gaming system, smartphone, tablet, or one of many household items that have become internet-capable in the last several years, such as doorbells, thermostats, coffee pots, refrigerators, toaster ovens, and even meat thermometers. Many of these devices lend a level of convenience to users by making controls available on the go via a smartphone app or website. While convenient, connected devices also transmit and store data and could be exploited by cyber threat actors to compromise networks, devices, or accounts. Compromised connected devices, combined with vulnerable home routers, increase the risk of cybercriminal activity and cyberattacks. Additionally, devices routinely connected to a home network can have further implications when subsequently connected to corporate networks and may introduce additional vulnerabilities and risks. Therefore, it is vital for users to employ cybersecurity best practices for the new gadgets they receive this holiday season and ensure devices and networks currently in use are properly secured.

Continue reading Stopping Your “Smart TV” From Spying on you

Posted on

’TIS THE SEASON TO BE WARY: NEARLY 2,000 AMERICANS ARE HACKED EVERY MINUTE

external content.duckduckgo 49

the staff of the Ridgewood blog

Ridgewood NJ, Cyber criminals are launching a relentless tide of attacks on US internet users — hacking 1,966 Americans every minute, virtual private network provider NordVPN can reveal1.

With the festive season offering cyber criminals a host of opportunities to cash in, the average US adult suffers a cyber attack of some kind four times a year, Nord’s latest research shows.

Continue reading ’TIS THE SEASON TO BE WARY: NEARLY 2,000 AMERICANS ARE HACKED EVERY MINUTE

Posted on

NJOHSP : Exercise Caution During Job Search

external content.duckduckgo 1

the staff of the Ridgewood blog

Ridgewood NJ, according NJ OFFICE OF HOMELAND SECURITY AND PREPAREDNESS ,  Job seekers are urged to exercise caution during their job search, as they could be targeted with fraudulent offers via phishing emails, social media, or SMS text messaging, according to NJCCIC. Threat actors entice their victims with promises of opportunities that are “too good to be true” to deliver malware, steal funds or collect personally identifiable information. These schemes may cost victims thousands of dollars and negatively impact their credit scores, according to the FBI. Job seekers are encouraged to research potential employers before providing sensitive information to unknown senders. The NJCCIC also recommends reviewing its Identity Theft and Compromised PII product for additional guidance.

Posted on

English Teenager Mastermind of International Hacking Group

external content.duckduckgo 43

the staff of the Ridgewood blog

Ridgewood NJ, Cybersecurity researchers investigating the recent Lapsus$ attacks have identified seven accounts associated with the hacking group. A 16-year-old living with his mother in England is believed to be the mastermind of the group. Rival hackers had posted his details online. The attacks were believed to be motivated in part by the desire for notoriety as the group didn’t try to cover its tracks and made public announcements.

Continue reading English Teenager Mastermind of International Hacking Group

Posted on

The 20 Passwords Most Commonly Used

external content.duckduckgo 49

the staff of the Ridgewood blog

Ridgewood NJ, according to a new report from mobile security firm Lookout, which recently published a list of the 20 passwords most commonly found in leaked account information on the dark web. The list ranges from simple number and letter sequences like “123456” and “Qwerty” to easily typed phrases like “Iloveyou.”

Continue reading The 20 Passwords Most Commonly Used

Posted on

Be Safe Online Shopping this Holiday Season

external content.duckduckgo 15 scaled

the staff of the Ridgewood blog

Ridgewood NJ, according to the New Jersey Cybersecurity and Communications Integration Cell , Cyber Monday 2020 set a record for e-commerce spending in one day, totaling $10.8 billion. With the pandemic raging on, many customers took to online stores to do their holiday shopping. While NJ COVID-19 cases have declined in recent weeks and vaccinations continue, we can still expect many customers to choose to conduct their shopping online and potentially start shopping earlier than usual given concerns for supply chain issues and shipping delays. Adobe predicts that online shopping spending will total over $200 billion for the first time ever by the end of the holiday season. Given the volume of e-commerce shopping, cybercriminals will continue their efforts to target online shoppers and marketplaces for financial gain. Therefore, it is vital to maintain awareness of the many cyber threats posed by these individuals and groups. Threat actors may target victims through a variety of methods, including compromised or spoofed websites, phishing emails, social media ads and messages, or unsecured Wi-Fi networks. Reviewing the following list of common attack vectors, along with tips and best practices, will help to combat the threats posed by cybercriminals this holiday season.

Continue reading Be Safe Online Shopping this Holiday Season

Posted on

Nigerian Hackers Use American Rescue Plan Act sign-up sites

unnamed 1

the staff of the Ridgewood blog

Ridgewood NJ, as part of the American Rescue Plan Act, the IRS began to distribute the first iteration of the child tax credit payments, which are automatically disbursed and do not require signing up for benefits, similar to past stimulus payments. Threat actors are quick to exploit public interests in order to carry out cyberattacks as reported by DomainTools researchers who discovered approximately 41 credential harvesting websites claiming to be American Rescue Plan Act sign-up sites. Researchers were able to trace the websites to a Nigerian web development firm, GoldenWaves Innovations. A spokesperson from GoldenWaves states their web hosting account was compromised and denies any involvement with these claims. They further stated that the sites are unable to be deleted due to illegal activity and have been forwarded to the Legal and Abuse department. DomainTools researchers assess that this activity is, in fact, linked to GoldenWaves and have reported the list of sites to Google Safe Browsing for blocking, further emphasizing the usefulness of historical WHOIS data.

Posted on

Sophisticated Ransomware Attack on US Tech Firm Affects 1,500 Organizations

external content.duckduckgo 43

the staff of the Ridgewood blog

Ridgewood NJ, a hacking group demanding $70 million infected the systems of a US information technology firm with ransomware over the Fourth of July weekend, impacting around 1,500 companies in at least 17 countries. REvil, the Russia-linked group behind another cyber attack on meat supplier JBS over Memorial Day weekend, took advantage of a software vulnerability to deploy this attack against Miami-based firm Kaseya. That software is sold to large managed service providers (MSPs), which assist small and midsize businesses, as well as local and state governments and agencies, in monitoring and controlling their computer networks.

Continue reading Sophisticated Ransomware Attack on US Tech Firm Affects 1,500 Organizations

Posted on

Cyber Risks Associated with Traveling

external content.duckduckgo 19

the staff of the Ridgewood blog

Ridgewood NJ, many people travel for business or leisure purposes year-round to local destinations or around the globe. As people travel and access public networks, they are exposed to various cyber risks. The NJCCIC reminds users to be aware of the cyber risks associated with traveling and to employ best practices to stay safe while they are away. Users are encouraged to review the recommendations for the security of devices, accounts, networks, vehicles, and international travel.

Continue reading Cyber Risks Associated with Traveling