For this assignment, I had to complete a CyberSecurity training course and find two different news articles about cyberattacks. For the two sources, I need to briefly describe the articles and evaluate its credibility.
There are a lot of ways that cybersecurity threats can hurt people, and it happens a lot more often than I thought on a wide scale. Any data trusted to any company can pose a risk to data being stolen, and cyberattacks are always evolving to be more dangerous. I also realized that the main motivation for most of these attacks are money.
DISA Global Solutions, a third-party employee screening service, had a cyber incident between February and April 2024, when an unauthorized third party hacked into their network and exposed personal information of millions of people, including thousands from Massachusetts. Data stolen included names, financial information, social security numbers, identity documents. If personal information is breached, it is important to take immediate steps to protect yourself, such as freezing credit, monitoring bank and credit card statements, deleting accounts that are no-longer used, and placing a fraud alert on credit files to keep new accounts opening or other changes without your knowledge and consent.
Source Evaluation
Who published the content? Ale Zimmerman & Bianca Beltran
Where was it published? NBC Boston News
When was it published? March 3, 2025
The truthfulness and integrity of the facts: Considered accurate, includes quotes and government documentation of the incident. Title can be a little better and just say "millions" instead of "hundreds of thousands", as millions of people had their data breached and not just Massachusetts.
How is it written and presented? Professional, some ads, but they disappear after a few seconds or appear in video form on the side so users can read.
Links and Citations: Links included the DISA incident notice from their website and some documentation from Maine and Massachusetts Attorney General offices.
A new phishing platform called Typhoon 2FA has emerged, allowing hackers to bypass multi-factor authentication (MFA) and steal login information. Hackers are targeting Gmail and Microsoft 365 users, sending emails with fake login pages that look legitimate. The phishing attacks are personalized, using extracted email addresses, and have victims provide their usernames, passwords, and MFA codes. Due to Tycoon 2FA being hard to detect, cybersecurity experts recommend a multi-layered defense strategy, which includes: Educating users on spotting suspicious emails, monitoring authentication laws for suspicious activity, using physical security keys, regularly updating software, and implementing adaptive authentication.
Source Evaluation
Who published the content? Brian Foster
Where was it published? Glass Almanac
When was it published? March 8, 2025
The truthfulness and integrity of the facts: Unsure of accuracy, lacks specific examples, but identifies other phishing kits and details how the scam unfolds
How is it written and presented? Written professionally, though a lot of ads on the page. A lot of bold words to draw attention to main ideas. Meant to inform that MFA doesn't stop hackers
Links and Citations: One link on "phishing", which directs to an article from the same publications about hackers being able to disable iMessage anti-phishing protection. They also have links to "similar posts"
A part of this assignment was to do the CCBC CSIT CyberSecurity training to 100% completion, meaning I had to watch all the videos and lessons, and pass the assessments to earn my certificate.