A Word About VPN’s (Virtual Private Network)

When it comes to choosing a VPN provider, you should consider several things, including privacy features, streaming, app design, device compatibility, speed, and so on. A must for me is a Zero Logging Policy. Why eliminate others being an;e to spy on you if your VPN provider is doing it.

Here are a couple of choices:

Express VPN is currently offering 3 months free. They provide great performance in just about every area and includes a 30-day money-back guarantee. The offer comes when you pay for 1 year up front. It also provides for the best monthly cost at $6.67

Nord VPN offers great performance with the (currently) most servers of any other provider. They also offer a 30-day money back guarantee. Their current offer is $3.99 a month (with a one year subscription) and $8.29 a month their after.

Here’s wishing safe and happy computing!

Malicious BlackCat ransomware attacks

green computer virus on notebook screen.

The ALPHV ransomware group (aka BlackCat) was observed employing signed malicious Windows kernel drivers to evade detection by security software during attacks.

The driver seen by Trend Micro is an improved version of the malware known as ‘POORTRY’.

The POORTRY malware is a Windows kernel driver signed using stolen keys belonging to legitimate accounts in Microsoft’s Windows Hardware Developer Program. While security software is usually protected from being terminated or tampered with, as Windows kernel drivers run with the highest privileges in the operating system, they can be used to terminate almost any process.

Trend Micro says the ransomware actors attempted to use the Microsoft-signed POORTRY driver, but its detection rates were high following the publicity it got and after the code-signing keys were revoked.

For more information take a look at Trend Micro’s report.

Apple Users Beware

Attackers Target macOS With ‘Geacon’ Cobalt Strike Tool

Hackers are using Go-language implementation of the red-teaming tool on Intel and Apple silicon-based macOS systems. Know as Cobalt Strike called Geacon that first surfaced on GitHub four years ago and had remained largely under the radar.

They are using the red-teaming and attack-simulation tool to target macOS systems in much the same way they have used Cobalt Strike for post-exploit activity on Windows platforms the past few years.

Using the Same Password for Everything

Using the same password for every is a common mistake, and one that hackers love! Hackers who compromise your computer system will use passwords stolen on different sites and hope hey strike gold.

Things to avoid

  1. Avoid reusing passwords. Advantage easy to remember. Disadvantage easy to hack.
  2. Avoid familiar things like names and birthdays.
  3. Do use character substitution instead of clear text. HappyDay becomes H@ppyD@y or PurpleMonkey Becomes Purpl3M0nk3y.
  4. Use a password tracking and creation tool such as Keypass or Dashlane.

For more information stop by and see us.