<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>myCyberStack</title>
	<atom:link href="https://mycyberstack.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://mycyberstack.com</link>
	<description></description>
	<lastBuildDate>Thu, 27 Jul 2023 16:38:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>

<image>
	<url>https://mycyberstack.com/wp-content/uploads/2022/11/apple-touch-icon-150x150.png</url>
	<title>myCyberStack</title>
	<link>https://mycyberstack.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Law Firms are Under Cyberattack</title>
		<link>https://mycyberstack.com/law-firms-are-under-cyberattack/</link>
		
		<dc:creator><![CDATA[dev_ops_r00t]]></dc:creator>
		<pubDate>Thu, 27 Jul 2023 15:47:09 +0000</pubDate>
				<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Hacking]]></category>
		<guid isPermaLink="false">https://mycyberstack.com/?p=2997</guid>

					<description><![CDATA[Think about how much personal information you give to your attorney.  Name, Social, Birthday, home address, phone number, even financial records, everything short of your underwear size, right?? But have you stopped and thought about what cybersecurity protocols your attorney has on their systems.  What is keeping all of that information you provided safe??  Well ]]></description>
										<content:encoded><![CDATA[<p>Think about how much personal information you give to your attorney.  Name, Social, Birthday, home address, phone number, even financial records, everything short of your underwear size, right??</p>
<p>But have you stopped and thought about what cybersecurity protocols your attorney has on their systems.  What is keeping all of that information you provided safe??  Well the answer may shock you.</p>
<p>According to the Bar Association as of December 2022 only 14% of law firms have Cybersecurity!!  14% that cannot be right, we give them ALL of our personal information and they do nothing to protect it.  Well guess what, the HACKERS have figured this out and now law firms are under attack – Hard Core!</p>
<p>In 2020, the Solicitors Regulation Authority (SRA) published a cybersecurity review revealing that 30 out of 40 of the law firms they visited have already been victims of a cyberattack. In the remaining ten, cybercriminals have directly targeted their clients through legal transactions.</p>
<p>“While not all incidents culminated in a financial loss for clients, 23 of the 30 cases in which firms were directly targeted saw a total of more than $5m+ of client money stolen,” the SRA noted.</p>
<p>5 Million Dollars worth of Client Money Stolen!!  Don’t let your money be stolen..</p>
<p>Whilst you might be implementing cyber security effectively within your own business, you’re exposed to numerous risks if your suppliers (or other third party in your supply chain) have not done the same.</p>
<p>Just like small businesses a lot of smaller Law Firms only have 10 to 15 attorneys.  They too cannot afford the larger more expensive Cybersecurity Solutions.  Let alone the IT expertise to run it.  But this is where n@d@r can help, it is a low-cost cyber solution that is 93% autonomous, it is a hardware device so it can protect 100% of the devices in your office, and it is easy to install and implement.  So, really what are you waiting for?</p>
<p>Do not be afraid to ask your attorney what kind of Cybersecurity they have in place to protect all of your and your businesses most valuable information.</p>
<p>How do you keep your personal and business information safe?</p>
<p>What steps have you taken to protect yourself and your business?<img decoding="async" class="alignnone size-medium wp-image-2998" src="https://mycyberstack.com/wp-content/uploads/2023/07/Law-firm-300x158.jpg" alt="" width="300" height="158" srcset="https://mycyberstack.com/wp-content/uploads/2023/07/Law-firm-300x158.jpg 300w, https://mycyberstack.com/wp-content/uploads/2023/07/Law-firm-1024x538.jpg 1024w, https://mycyberstack.com/wp-content/uploads/2023/07/Law-firm-768x403.jpg 768w, https://mycyberstack.com/wp-content/uploads/2023/07/Law-firm.jpg 1200w" sizes="(max-width: 300px) 100vw, 300px" /></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Are You Sharing Too Much Information with ChatGPT?</title>
		<link>https://mycyberstack.com/are-you-sharing-too-much-information-with-chatgpt/</link>
		
		<dc:creator><![CDATA[dev_ops_r00t]]></dc:creator>
		<pubDate>Tue, 06 Jun 2023 18:35:36 +0000</pubDate>
				<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Hacking]]></category>
		<guid isPermaLink="false">https://mycyberstack.com/?p=2982</guid>

					<description><![CDATA[Hackers have figured out how a to look at everything you have been asking ChatGPT and see the answers. Instead of attackers using ChatGPT to cause cyber attacks, they have turned the technology on itself. OpenAI, which developed the chatbot, confirmed a data breach of the system, according to Security Week. The breach took the ]]></description>
										<content:encoded><![CDATA[<p>Hackers have figured out how a to look at everything you have been asking ChatGPT and see the answers.</p>
<p>Instead of attackers using ChatGPT to cause cyber attacks, they have turned the technology on itself. OpenAI, which developed the chatbot, confirmed a data breach of the system, according to Security Week. The breach took the service offline until it was fixed.</p>
<p>ChatGPT has quickly became <a href="https://www.reuters.com/technology/chatgpt-sets-record-fastest-growing-user-base-analyst-note-2023-02-01/">the fastest-growing consumer app</a> in history, reaching over 𝟏𝟎𝟎 𝐦𝐢𝐥𝐥𝐢𝐨𝐧 𝐦𝐨𝐧𝐭𝐡𝐥𝐲 𝐮𝐬𝐞𝐫𝐬 by January. Approximately 13 million people used the AI technology daily within a full month of its release. Let’s compare that to another extremely popular app — TikTok — which took 𝗡𝗜𝗡𝗘 𝗠𝗢𝗡𝗧𝗛𝗦 to reach similar user numbers.</p>
<p>Anytime you have a popular app or technology, it’s only a matter of time until Hackers start targeting it. For ChatGPT, the exploit came via a vulnerability in the Redis open-source library. This allowed users to see the chat history of other active users.</p>
<p>Because thousands of contributors develop and have access to the <a href="https://www.ibm.com/topics/open-source">open-source</a> code that makes up ChatGPT, it’s easy for vulnerabilities to go unnoticed. Hackers are very aware of this fact, which is why attacks on open-source libraries have <a href="https://portswigger.net/daily-swig/researchers-find-633-increase-in-cyber-attacks-aimed-at-open-source-repositories">increased by 742%</a> since 2019.</p>
<p>The ChatGPT exploit has been classified as minor, and OpenAI was able to patch the bug within days. But we have to keep in mind even a minor cyber incident can create a lot of damage.</p>
<p>This was considered to be a 𝐬𝐮𝐫𝐟𝐚𝐜𝐞-𝐥𝐞𝐯𝐞𝐥 𝐢𝐧𝐜𝐢𝐝𝐞𝐧𝐭. But as researchers from OpenAI looked closer, they discovered the same vulnerability was likely responsible for Hackers being able to look at 𝐜𝐮𝐬𝐭𝐨𝐦𝐞𝐫 𝐩𝐚𝐲𝐦𝐞𝐧𝐭 𝐢𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 for a few hours before ChatGPT was taken offline.</p>
<p>“It was possible for some users to see another active user’s first and last name, email address, payment address, the last four digits (only) of a credit card number and credit card expiration date. Full credit card numbers were not exposed at any time,” OpenAI said in a <a href="https://openai.com/blog/march-20-chatgpt-outage">release</a> about the incident.</p>
<p>There are some potentially huge privacy concerns surrounding the use of chatbots. The AI technology stores vast amounts of data and then uses that information to generate responses to questions and prompts. And anything in the chatbot’s memory becomes fair game for other users.</p>
<p>For example, chatbots can record a single user’s notes on any topic and then summarize that information or search for more details. But if those notes include <strong>sensitive data — an organization’s intellectual property or sensitive customer information</strong>, for instance — it enters the chatbot library. The person <strong>no longer has control over that information</strong>.</p>
<p>Because of these privacy concerns, some businesses and entire countries are restricting access or blocking it altogether.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Over 400 million Infected with Android Spyware</title>
		<link>https://mycyberstack.com/over-400-million-infected-with-android-spyware/</link>
		
		<dc:creator><![CDATA[dev_ops_r00t]]></dc:creator>
		<pubDate>Sat, 03 Jun 2023 16:10:20 +0000</pubDate>
				<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Hacking]]></category>
		<guid isPermaLink="false">https://mycyberstack.com/?p=2976</guid>

					<description><![CDATA[Over 100 Android apps with more than 400 million downloads combined have been infected with a new malware strain that’s being distributed as a software development kit (SDK) for advertisers. As reported by BleepingComputer, the discovery was made by security researchers at Dr. Web who found a spyware module inside the affected apps that they’ve ]]></description>
										<content:encoded><![CDATA[<p>Over 100 Android apps with more than 400 million downloads combined have been infected with a new <a class="hawk-link-parsed" href="https://www.tomsguide.com/news/rilide-malware-is-stealing-2fa-codes-and-passwords-what-you-need-to-know" data-component-tracked="1"><u>malware strain</u></a> that’s being distributed as a software development kit (SDK) for advertisers.</p>
<p>As reported by <a class="hawk-link-parsed" href="https://www.bleepingcomputer.com/news/security/android-apps-with-spyware-installed-421-million-times-from-google-play/" target="_blank" rel="noopener" data-url="https://www.bleepingcomputer.com/news/security/android-apps-with-spyware-installed-421-million-times-from-google-play/" data-component-tracked="1"><u>BleepingComputer</u></a>, the discovery was made by security researchers at <a class="hawk-link-parsed" href="https://www.tomsguide.com/news/bad-batch-of-android-apps-with-millions-of-downloads-discovered-in-play-store-delete-them-now" data-component-tracked="1"><u>Dr. Web</u></a> who found a spyware module inside the affected apps that they’ve dubbed ‘SpinOk’.</p>
<aside class="hawk-nest hawk-processed" data-render-type="fte" data-skip="dealsy" data-widget-type="seasonal" data-widget-id="ab36299f-3c5c-43fc-9d1b-c97f4183a560" data-result="missing"></aside>
<p>The reason this new Android malware is being referred to as <a class="hawk-link-parsed" href="https://www.tomsguide.com/news/this-dangerous-android-malware-spies-on-your-every-move-what-to-do" data-component-tracked="1"><u>spyware</u></a> is due to the fact that it can steal private data stored on the <a class="hawk-link-parsed" href="https://www.tomsguide.com/us/best-android-phones,review-6051.html" data-component-tracked="1"><u>best Android phones</u></a> and send it to a remote server controlled by the hackers behind this campaign.</p>
<h2 id="delete-these-apps-right-now">Delete these apps right now</h2>
<p>According to <a class="hawk-link-parsed" href="https://news.drweb.com/show/?i=14705" target="_blank" rel="noopener" data-url="https://news.drweb.com/show/?i=14705" data-component-tracked="1"><u>Dr. Web’s report</u></a> on the matter, the <a class="hawk-link-parsed" href="https://www.tomsguide.com/us/best-antivirus,review-2588.html" data-component-tracked="1">antivirus</a> maker claims to have found 101 apps that were downloaded more than 421 million times from the <a class="hawk-link-parsed" href="https://www.tomsguide.com/news/hackers-are-sneaking-malware-on-to-the-google-play-store-how-to-stay-safe" data-component-tracked="1"><u>Google Play Store</u></a>. Below, you’ll find the affected apps with the most downloads and you can <a class="hawk-link-parsed" href="https://github.com/DoctorWebLtd/malware-iocs/blob/master/Android.Spy.SpinOk/README.adoc" target="_blank" rel="noopener" data-url="https://github.com/DoctorWebLtd/malware-iocs/blob/master/Android.Spy.SpinOk/README.adoc" data-component-tracked="1">find the full list here</a>:</p>
<ul>
<li><strong>Noizz: video editor with music</strong> &#8211; 100 million downloads</li>
<li><strong>Zapya &#8211; File Transfer, Share </strong>&#8211; 100 million downloads</li>
<li><strong>vFly: video editor&amp;video maker </strong>&#8211; 50 million downloads</li>
<li><strong>MVBit &#8211; MV video status maker</strong> &#8211; 50 million downloads</li>
<li><strong>Biugo &#8211; video maker&amp;video editor </strong>&#8211; 50 million downloads</li>
<li><strong>Crazy Drop</strong> &#8211; 10 million downloads</li>
<li><strong>Cashzine &#8211; Earn money reward</strong> &#8211; 10 million downloads</li>
<li><strong>Fizzo Novel &#8211; Reading Offline</strong> &#8211; 10 million downloads</li>
<li><strong>CashEM: Get Rewards</strong> &#8211; 5 million downloads</li>
<li><strong>Tick: watch to earn</strong> &#8211; 5 million downloads</li>
</ul>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ScanSource Ransomware Attack</title>
		<link>https://mycyberstack.com/scansource-ransomware-attack/</link>
		
		<dc:creator><![CDATA[dev_ops_r00t]]></dc:creator>
		<pubDate>Thu, 18 May 2023 21:40:34 +0000</pubDate>
				<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Hacking]]></category>
		<guid isPermaLink="false">https://mycyberstack.com/?p=2971</guid>

					<description><![CDATA[Technology provider ScanSource has announced it has fallen victim to a ransomware attack impacting some of its systems, business operations, and customer portals. ScanSource is a U.S.-based cloud service and SaaS connectivity and network communications provider that also offers special PoS (point of sale) and payments, security, and AIDC (automatic identification and data capture) solutions. ]]></description>
										<content:encoded><![CDATA[<p>Technology provider ScanSource has announced it has fallen victim to a ransomware attack impacting some of its systems, business operations, and customer portals.</p>
<p>ScanSource is a U.S.-based cloud service and SaaS connectivity and network communications provider that also offers special PoS (point of sale) and payments, security, and AIDC (automatic identification and data capture) solutions.</p>
<p>The firm is also the owner of the cloud service provider and education platform Intelisys, and cloud distributor and managed services provider intY.</p>
<p>Starting around May 15th, ScanSource customers contacted BleepingComputer saying they no longer had access to the company&#8217;s customer portals and websites, concerned that they suffered a cyberattack.</p>
<p>Yesterday, ScanSource confirmed that they suffered a ransomware attack on May 14, 2023 that impacted some of its systems.</p>
<p>The company began implementing its incident response plan, including alerting law enforcement and enlisting the aid of forensic and cybersecurity professionals.</p>
<p>These experts assist with the ongoing investigation and help implement strategies to minimize the operational disruptions caused by the incident.</p>
<p>The impact of the cyberattack has been significant, as the company warns that there will be delays in the provision of services to customers in the forthcoming period, expected to affect operations in North America and Brazil.</p>
<p>&#8220;The Company is working diligently to bring affected systems back online, while also mitigating the impact on its business,&#8221; reads the <a href="https://storage.pardot.com/704223/1684277198bEZlDMDs/CIR_PressRelease_Final_051623.pdf" target="_blank" rel="nofollow noopener">press release</a>.</p>
<p>&#8220;ScanSource regrets any inconvenience or delays in business this may cause customers and suppliers in North America and Brazil and appreciates their patience.&#8221;</p>
<p>The tech company is a Fortune 1000 entity <a href="https://www.nasdaq.com/market-activity/stocks/scsc" target="_blank" rel="nofollow noopener">traded on NASDAQ,</a> where its stock price recorded a 1.42% drop today, presumably a result of the cyberattack disclosure.</p>
<p>At the time of publication, it is not known what ransomware operation is behind the attack or whether data has been stolen.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
