Chinese hackers breach office that reviews foreign investments in US

Yes, both piggybacking and phishing are common methods hackers use, along with other tactics like pretexting, baiting, and spear phishing, to exploit human vulnerabilities and gain unauthorized access...

CompTIA Security plus SY0-701
2.2 Explain common threat vectors and attack surfaces.
If you want to know if any particular concept is covered in any CompTIA course, CIN is the place to come - precious has your answer!!!!
  • Haha
Reactions: precious

I broke O365 while preparing curriculum for a program that aligns to DataX :-)

Back in early December, I managed to take down O365 email and Teams messaging for my entire organization for 3 days. Anyone who sent an email or Teams message with an attachment would immediately have it quarantined without recourse as "High confidence phish." I didn't realize it was me until a bunch of people from the Microsoft 365 security team sent me LinkedIn requests - and one of them let me know.

So what happened?

I was going down the machine learning rabbit hole while building out a new program for Data Analysis and AI that maps to all of the content on the DataX certification. As a software developer, that meant I was playing with Tensorflow, Keras, Scikit-learn, and so on - and since I have one of those Snapdragon Copilot+ PCs, I was playing with ONNX + QNN for the purposes of automating the creation of my 1-on-1 progress report I have to do each month for my boss. It had full access to my O365/Teams/SharePoint/OneDrive, but all models (mostly quantized) were run locally to ensure that no sensitive data was copied elsewhere.

A bit of automation to comb through my previous month's emails, Teams messages, and key files to fill in a form with my vernacular seemed harmless to me, but freaked out Microsoft Sentinel on the O365 side as it wasn't used to that type of searching/activity.

But it ended well - our IT team got a good chaos engineering exercise, I got my 1-on-1 progress report finished, and others in my organization are now more paranoid about AI in general.

I'm looking forward to generating my 1-on-1 report again next week :cool:

Chinese hackers breach office that reviews foreign investments in US

Do they use piggybacking or phishing method to execute their plan.
Yes, both piggybacking and phishing are common methods hackers use, along with other tactics like pretexting, baiting, and spear phishing, to exploit human vulnerabilities and gain unauthorized access...

CompTIA Security plus SY0-701
2.2 Explain common threat vectors and attack surfaces.

Upcoming SME Workshops

hm,
the Website still lists CTT+ as part to apply for.
And it does not have all German States listes as Region (only Sachsen). Not all 16.
Sad..

And still this sentence:
Although CompTIA appreciates interest from the training community, applications from trainers, authors, or individuals who may profit or materially benefit from knowledge of the CompTIA credential content are not eligible to participate.

That still removes all Applications from Trainers directly as i understand it. Even i do not teach CompTIA Cloud+
It's not accurate to say that Trainers cannot be SMEs for CompTIA exams. I was retained as an SME to help write exam questions for a Cybersecurity Fundamentals+ exam, which CompTIA ultimately did not choose to pursue further. I was told by the staff at CompTIA that trainers could participate, but they could not produce books or video series where they would financially benefit from being an SME. The trainers could work on the certification. The trainers could take the certification exam. The trainers could teach the class. They could not produce content that could be sold.
  • Like
Reactions: precious

Passed Cloud+ CV0-004

Happy New Year! I hope you’re all doing well. I’ve been hard at work preparing for the Cloud+ certification, and I’m thrilled to share that I successfully passed the exam this morning! It was quite a challenge—definitely not an easy test. My experience really came into play, and I just managed to scrape by with a passing score.

Now, I’m feeling elated and relieved, and most importantly, I’ve gained valuable experience. I have many exciting projects lined up across various Cloud Service Providers.

I am eagerly waiting for the CloudNetX results. Hoping for a pass too. Thank you CIN for the voucher.
Congratulations on this latest achievement!!!

Chinese hackers breach office that reviews foreign investments in US

I understand your point, and the U.S. does indeed have a strong defensive team. Their ability to adapt and respond quickly to challenges sets them apart. However, it’s also worth considering that end users within the systems are not cybersecurity experts which of course is another weak point-social engineering or hackers might find a clever way of exploiting vulnerabilities in the system
Do they use piggybacking or phishing method to execute their plan.

Chinese hackers breach office that reviews foreign investments in US

i am talking from the angle , The US have very strong defensive team.
I understand your point, and the U.S. does indeed have a strong defensive team. Their ability to adapt and respond quickly to challenges sets them apart. However, it’s also worth considering that end users within the systems are not cybersecurity experts which of course is another weak point-social engineering or hackers might find a clever way of exploiting vulnerabilities in the system

Chinese hackers breach office that reviews foreign investments in US

This other breach shows growing sophistication and reach of state-sponsored cyberattacks. Such incidents emphasize the need for robust cybersecurity measures, particularly for government agencies handling sensitive economic and national security information.
how does it happened seriously.

Passed Cloud+ CV0-004

Happy New Year! I hope you’re all doing well. I’ve been hard at work preparing for the Cloud+ certification, and I’m thrilled to share that I successfully passed the exam this morning! It was quite a challenge—definitely not an easy test. My experience really came into play, and I just managed to scrape by with a passing score.

Now, I’m feeling elated and relieved, and most importantly, I’ve gained valuable experience. I have many exciting projects lined up across various Cloud Service Providers.

I am eagerly waiting for the CloudNetX results. Hoping for a pass too. Thank you CIN for the voucher.
congratulation

Upcoming SME Workshops

hm,
the Website still lists CTT+ as part to apply for.
And it does not have all German States listes as Region (only Sachsen). Not all 16.
Sad..

And still this sentence:
Although CompTIA appreciates interest from the training community, applications from trainers, authors, or individuals who may profit or materially benefit from knowledge of the CompTIA credential content are not eligible to participate.

That still removes all Applications from Trainers directly as i understand it. Even i do not teach CompTIA Cloud+

Filter