cybersecurity protocols

AppWizard
August 15, 2025
Residents and visitors in Morong, Rizal, and Mambajao, Camiguin Island can now make emergency calls through messaging apps and social media platforms as part of a modernization initiative for emergency response systems. Mambajao activated its local 911 emergency hotline on February 27, becoming the first next-generation 911-enabled command center in Northern Mindanao, reducing response times to three to seven minutes. The Next Generation Advanced (NGA) 911 Philippines launched the NEXiS Message platform, allowing emergency calls via traditional voice methods, text messages, video calls, and popular applications like Facebook Messenger. This system consolidates incoming messages into a single platform, improving efficiency and response times while ensuring the security of shared information through encryption. NEXiS Message integrates with legacy and modern communication technologies and facilitates inter-agency collaboration. NGA 911 Philippines aims to expand next-generation 911 technology to more communities in the country and has received certification from the National Emergency Number Association (NENA).
AppWizard
December 4, 2024
U.S. officials recommend citizens use encrypted messaging applications due to recent cyberattacks on major telecommunications companies, including AT&T and Verizon. Microsoft identified a hacking campaign called "Salt Typhoon" as a significant intelligence breach, which remains unresolved. The attacks are believed to be conducted by Chinese entities targeting American citizens, though Chinese officials have not commented on the allegations.
Tech Optimizer
September 17, 2024
The RansomHub ransomware group is using Kaspersky's TDSSKiller tool to bypass endpoint detection and response (EDR) systems, allowing them to deploy secondary malware undetected. After infiltrating a system, they first disable existing EDR solutions before releasing infostealers or encryption malware. TDSSKiller, originally designed to detect and eliminate rootkits, has been repurposed by RansomHub for their malicious activities. This trend raises significant concerns in the cybersecurity community regarding the exploitation of legitimate software by cybercriminals.
Search