internet safety week

Internet Security Week – Edition No. 127

In Edition No. 127 of Internet Security Week , Hacker Attack takes 15 minutes, Phishing Disguised, Malware Steals Facebook ads, new generation ransomware and more.


News

As Microsoft blocks Office Macros, hackers find new forms of attack

Hackers that normally distributed malware through phishing attachments with malicious macros gradually changed tactics after Microsoft Office began blocking them by default, changing new file types such as ISO, rar and Windows Shortcut (LNK) attachments.

By Bill Toulas in Bleeping Computer

Criminals take 15 minutes to attack after discovery of security failures

Cybercriminals can take only 15 minutes to start exploring a safety failure from the moment it is revealed, trusting precisely on the idea that organizations will take more time to apply corrections to their systems.

By Felipe Demartini in Canaltech

PHISHING UNFORGED: Be wary of emails marked as insurance

By sending phishing emails or malicious attachments, scammers deploy a series of tricks to persuade you to click on a link or open a file. One of these tricks is to add all possible stamp types, indicating that the attached link or file is reliable.

By Roman Dedenok in Kaspersky Daily

RUG PULL: blow affects investors in cryptocurrencies

Rug Pull is a type of coup in which creators of a particular project seek to attract investors to a new cryptocurrency in order to then run away with the funds raised.

By Martina López in We Live Secity

Malware steals business and Facebook ad accounts

Facebook is being the target of a cybercriminous operation called DuckTail, which aims to assume control of commercial accounts and advertising from the social network for financial theft.

In Ciso Advisor

Trends of DDOS attacks in 2022: Ultra -Accusal, Powerful and Multivectoral Attacks

The political situation in Europe and the rest of the world was dramatically deteriorated in 2022. This affected the nature, intensity and geography of DDOS attacks, which were actively used for political purposes.

By Lawrence Abrams in Bleeping Computer

Leakage may have exposed 300,000 real estate group documents in Brazil

A large leakage of data would have reached the Lopes real estate network, which includes brands such as New Place, local and VNC. In total, there would be more than 300,000 documents obtained by cybercriminals, including negotiations between customers, proposals, and internal email exchanges, possibly placing personal information and sensitive details in the hands of non-authorized third parties.

By Felipe Demartini in Canaltech

The new generation of ransomers is now multiplatform

Lately, ransomware groups are increasingly targeted not only to Windows computers, but also to Linux devices and ESXI virtual machines.

By Julia Glazova in Kaspersky Daily

False Invoice: Criminals are passing by operator to propagate the trojan Grandoreiro

Criminals are passing through the living operator to propagate a threat capable of obtaining bank information from the victims after being installed.

By Daniel Cunha Barbosa in We Live Secity

Lockbit interview: “There are over 100 people in the operation”

RaS (Ransomware as a Service) Lockbit 3.0 (ransomware as more than one hundred people, said the operation leader in an interview with the Italian portal Red Hot Cyber.

In Ciso Advisor


ebook

[ebook] How to avoid data leakage at the company

  • Complete material on data leakage, access control and internet security for companies
  • Available for download
  • Free

Are you not yet registered on our newsletter to receive this content weekly in the email? Then subscribe through the link below:

https://br.lumiun.com/semana-da-eguranca-na-internet

Share the link with your colleagues and friends.

Lumiun DNS Free Trial
Related Posts