internet safety week

Internet Security Week – Edition No. 136

In Edition No. 136 of Internet Security Week , the 10 most common financial blows in Brazil, Banco do Brasil would be the next target of hacker, which is IT governance and why it is important for companies and more.


News

These are the 10 most common financial blows in Brazil

FEBRABAN (Brazilian Federation of Banks) has been warning, since the beginning of the month, about the incidence of more and more blows against Brazilian citizens. The alerts are part of an awareness campaign that listed the 10 main types of frauds most applied by the bandits, keeping an eye on personal data and, especially, financial information.

By Felipe Demartini in Canaltech

Harly: Another signature trojan on Google Play

It is common to find all types of malware hidden in what appear to be harmless apps in official stores like Google Play. Unfortunately, even if the platform is carefully analyzed, moderators cannot always get these applications before they are published.

By Tatyana Shishkova in Kaspersky Daily

BANCO DO BRASIL in the sight of the hacker that leaked the GTA 6

According to the Twitter profile “Michael” (@legacykillahd), who closely observed the attacks, “yesterday came evidence showing that last week the young English was attacking other companies other than Rockstar and Uber, including Banco do Brasil”.

In Ciso Advisor

Shadow it: How to manage the safety risks of this phenomenon

The use of hardware and software not authorized by corporate employees is a problem that has been accentuated in home office times.

By Phil Muncaster in We Live Security

Brute Ratel Group's “tool kit” is being shared for free in hacker communities

For those who are not familiar with Brute Ratel C4 (BRC4), it is a post-exploration tool kit created by Chetan Nayak, a former Red Equipa of the Radding and Crowstrike.

By Lawrence Abrams in Bleeping Computer

What is IT governance and why is it important for companies

IT governance consists of a sector belonging to information technology that seeks to optimize processes and ensure that technological resources are used efficiently and assertively. To help you better understand how this process works, read this article!

By Kelvin Zimmer in Lumiun Blog

A new method of PC infection does not depend on executable files or even macros of the Office package, just by the user mouse over a link for the contamination chain to start. The attack, associated with a Russian cybercriminal group, uses a PowerPoint presentation and the name of the OECD (Organization for Economic Cooperation and Development) to make high -ranking victims.

By Felipe Demartini in Canaltech

Browser Extensions: More dangerous than you think

Each of us probably installed some kind of browser extension at least once: an ad blocker, an online translator, an orthographic check, or something else. However, we rarely stop to think: Is the extension really safe?

By Anastasia Starikova in Kaspersky Daily

Phishing attacks grow 230% in the first half

Ransomware attacks and threats aimed at Android devices are among the main risks to companies in Brazil, according to the Eset Security Report 2022. The report by the leading proactive threat detection company presents information about the digital security scenario in the Brazilian corporate environment during the first half of this year.

In Ciso Advisor


Podcast

LGPD: Understand what has changed and what are the new challenges - We live secondity (by eset)

  • Check out the new episode of the safe podcast connection. This time, we highlight the changes generated by the implementation of LGPD and the challenges faced by companies to adapt to the law.
  • Free

Are you not yet registered on our newsletter to receive this content weekly in the email? Then subscribe through the link below:

https://br.lumiun.com/semana-da-eguranca-na-internet

Share the link with your colleagues and friends.

Lumiun DNS Free Trial
Related Posts