<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.floodcomputingsolutions.com/blogs/security/feed" rel="self" type="application/rss+xml"/><title>Flood Computing Solutions - Blog , Security</title><description>Flood Computing Solutions - Blog , Security</description><link>https://www.floodcomputingsolutions.com/blogs/security</link><lastBuildDate>Tue, 07 Apr 2026 07:27:55 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Cookie Monster Strikes Genesis]]></title><link>https://www.floodcomputingsolutions.com/blogs/post/Genesis-Market-Seized</link><description><![CDATA[<img align="left" hspace="5" src="https://www.floodcomputingsolutions.com/images/fbi-detective-using-laptop-in-his-office.jpg"/>The Genesis is a dark web marketplace that was created in 2018. In 2023, the FBI shut down the Genesis marketplace in an operation called ‘Cookie Monster’. The operation was a major success for the FBI, as it dealt a significant blow to the black market on the dark web.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_FgMq_ZCYTq-Vs2sRGkfLsQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_IT5gQnZcS6aNPgWV_ATJzg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_u8KxAkOqRq6hxB_32uWjwQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_NVbWIJQOTX6yoBEQos90BA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_NVbWIJQOTX6yoBEQos90BA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Genesis Market Seized</span></h2></div>
<div data-element-id="elm_GAHippj5RD-lMsrEExnmmQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GAHippj5RD-lMsrEExnmmQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;">Genesis Market appears to have been taken down in connection with the FBI's Operation Cookie Monster. From what we have learned it appears that the FBI has orchestrated a sweeping act against various websites that are thought to be connected to dark web and cybercrime activity.</p><p style="text-align:left;"><br></p><p style="text-align:left;">Genesis Market homepage now lists the domain as being seized in connection with Operation Cookie Monster. This appears to be done as a result of&nbsp;a warrant issued by a Wisconsin court.</p><p style="text-align:left;"><br></p><p style="text-align:left;">Reports include dozens of arrests in the United States and other countries. We are interested to see how this story continues to develop. Including 120 arrests around the Genesis Market sites.&nbsp;</p><p style="text-align:left;"><br></p><p style="text-align:left;">The&nbsp;<a href="https://www.f5.com/labs/articles/threat-intelligence/genesis-marketplace--a-digital-fingerprint-darknet-store" target="_blank" rel="noreferrer noopener">Genesis</a>&nbsp;marketplace has been around since late 2018, offering cybercriminals access to hundreds of thousands of so-called ‘bots’ that could be used to carry out malicious activities and bypass anti-fraud systems.&nbsp;<br></p><p style="text-align:left;"><br></p><p style="text-align:left;">The bots were directly related to obtaining the browsers&nbsp;fingerprint, using malicious&nbsp;malware. This particular site was an invite only organization.&nbsp;</p><p style="text-align:left;"><br></p><p style="text-align:left;">It will be interesting to see how this Operation Cookie Monster continues to unfold.&nbsp;</p></div>
</div><div data-element-id="elm_K89khxwgv-WoWJN6Ugjklw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_K89khxwgv-WoWJN6Ugjklw"] .zpimage-container figure img { width: 1110px ; height: 623.86px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_K89khxwgv-WoWJN6Ugjklw"] .zpimage-container figure img { width:723px ; height:406.35px ; } } @media (max-width: 767px) { [data-element-id="elm_K89khxwgv-WoWJN6Ugjklw"] .zpimage-container figure img { width:415px ; height:233.24px ; } } [data-element-id="elm_K89khxwgv-WoWJN6Ugjklw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Cookie%20Monster.png" width="415" height="233.24" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_e_u7d6kMT5GZmp_FNk1TyQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 05 Apr 2023 12:31:50 -0700</pubDate></item><item><title><![CDATA[Attention Data Breach Last Pass ]]></title><link>https://www.floodcomputingsolutions.com/blogs/post/LastPass</link><description><![CDATA[<img align="left" hspace="5" src="https://www.floodcomputingsolutions.com/data breach last pass.jpg"/> Is there a safe place to store your passwords online? ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_61cEqEtFTaauW-ai9PQ_aw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1nyrVOAmQuuI6qDD4LUPFg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_IImb7taxRJqisYWt5r6ifg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_LieRX-qFSx-QB76sjM_e7g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_LieRX-qFSx-QB76sjM_e7g"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Last Pass Data Breach</h2></div>
<div data-element-id="elm_SmuJX01MRym_if9xPQ5I4g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_SmuJX01MRym_if9xPQ5I4g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p style="text-align:left;"><span style="color:inherit;"><span style="font-size:14px;">Is there a safe place to store your passwords online?</span></span></p></blockquote><p></p><div style="text-align:left;"><span style="font-size:14px;"><br></span></div>
<div style="color:inherit;text-align:left;"><span style="font-size:14px;color:inherit;">In short, no. The vault of your own mind, and pen and paper are still the most secure methods of keeping track of your passwords.</span></div>
<div style="text-align:left;"><span style="font-size:14px;"><br></span></div><span style="color:inherit;font-size:14px;"><div style="text-align:left;"><span style="color:inherit;">As seen with the recent news release from LastPass, owned by GoTo (formerly LogMeIn), a company trusted by more than 30 million users and 85,000 business customers worldwide. Last Pass had been breached in August of 22, that went through October 22.</span></div></span><div style="text-align:left;"><span style="font-size:14px;"><br></span></div>
<span style="color:inherit;font-size:14px;"><div style="text-align:left;"><span style="color:inherit;">The result of the first breech allowed the threat actor enough information to use a software to capture a DevOps Engineer's corporate vault, password and MFA authentication. Giving them access to millions of critical database files.</span></div></span><div style="text-align:left;"><span style="font-size:14px;"><br></span></div>
<span style="color:inherit;font-size:14px;"><div style="text-align:left;"><span style="color:inherit;">The temptation for easy login and password remembrance is not worth the security risk.</span></div>
<div style="text-align:left;"><br></div></span><p></p></div></div></div></div></div>
</div></div> ]]></content:encoded><pubDate>Mon, 06 Mar 2023 06:00:00 -0800</pubDate></item><item><title><![CDATA[February Patch Tuesday News ]]></title><link>https://www.floodcomputingsolutions.com/blogs/post/february-patch-tuesday-news</link><description><![CDATA[<img align="left" hspace="5" src="https://www.floodcomputingsolutions.com/images/patch-158649__340.png"/>Microsoft’s Patch Tuesday machine is humming loudly with software updates to fix at least 76 vulnerabilities in Windows and OS components and the comp ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_kX6ngks6Rza9MHZaAAeOfw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_9rDzPuKzTrmwz-n56Ax4NQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_7UCmsAr4SAGsiqi8gK3QtA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_e5plJa4WQw2q1765RCrZag" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">February Patch Tuesday News</h2></div>
<div data-element-id="elm_X5HQR0vhR8mpT2Htg7a-vA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_X5HQR0vhR8mpT2Htg7a-vA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><span style="font-size:14px;">Microsoft’s Patch Tuesday machine is humming loudly with software updates to fix at least 76 vulnerabilities in Windows and OS components and the company is warning that some of the bugs have already been exploited in the wild.&nbsp;</span></span><br></p></div>
</div><div data-element-id="elm_3Tu9lINJIn6Dyg3mRe-EKQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_3Tu9lINJIn6Dyg3mRe-EKQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://www.securityweek.com/patch-tuesday-microsoft-warns-of-exploited-windows-zero-days/?fbclid=IwAR0_Qyv4DtMLX73eb4sX2k57lC0IerhTRzJTGlyS-M2wUfYZvPIH2oX4eX0"><span class="zpbutton-content">Read More</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 14 Feb 2023 15:22:00 -0800</pubDate></item><item><title><![CDATA[New Malware Chaos]]></title><link>https://www.floodcomputingsolutions.com/blogs/post/Employee-Security-Awareness2</link><description><![CDATA[<img align="left" hspace="5" src="https://www.floodcomputingsolutions.com/images/abstract-warning-of-a-detected-malware-program.jpg"/>Surprise! There is a new malware spreading. It appears to have been released around April 2022, though now is when we see an uptick in the spread. Wha ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_b0CMTep1RMmu18JQ7HDRtA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_wuX3uL5tQ1ioEMMDT-L9BQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mKG6rJJpTeyIXBYMUlBnFw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_GYybcpqqSiOST5gKkOJkmg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_GYybcpqqSiOST5gKkOJkmg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div style="width:930px;"><h3 style="font-size:20px;width:930px;"><div style="text-align:left;"><p><span style="color:inherit;"><b>September 22, 2022</b></span><br></p></div></h3></div><div style="width:930px;"><div style="text-align:left;"><p><span style="color:inherit;"><b>New Malware Hitting Businesses Hard</b></span><br></p></div></div></div></h2></div>
<div data-element-id="elm_FBsQ_8gPRyOR647P81Df-g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FBsQ_8gPRyOR647P81Df-g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Surprise! There is a new malware spreading. It appears to have been released around April 2022, though now is when we see an uptick in the spread. What makes this little bugger a “fun” one is it capable of attacking Linux and Windows devices. This malware can infect anything from a router to a server system. What name has this critter been dubbed with? Chaos.</p><p><br></p><p>Chaos first appeared in mid-April of 2022, but in September 2022, we saw it spread with leaps and bounds. Chaos creators have been using it for the usual no-good crimes of DDoS attacks and crypto mining. While media, financial firms, and hosting companies have been the primary victims of Chaos, it has crossed many other industries.</p><p><br></p><p>Current recommendations to protect against Chaos are patching known CVEs, regularly monitoring all systems, changing passwords regularly, and removing old root access on machines. Weekly reboots of routers and all computer systems will also assist in clearing out malware.</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 19 Aug 2022 05:00:00 -0700</pubDate></item></channel></rss>