In Edition 158 of Internet Security Week , how HR works in cyber crime, companies that pay rescue finance other attacks, email attacks can handle slips and divert payments and more.
News
Bank virus blows for mobile phone almost doubled in 2022
That banking viruses are the main focus of cybercriminals in the blows against ordinary users, everyone knows. But now this movement appears quantified in numbers, with 196,400 attempts at attacks using financial trojans recorded over 2022; The number represents almost twice the observed last year and is the largest total since 2016.
By Felipe Demartini in Canaltech
HR of Crime: How Recruitment on Dark Web works
Illegal business in the parallel economy need employees as much as their legal counterparts. Let's take a look at how “Rh Dark” works.
By Dmitry Reznikov in Kaspersky Daily
Companies that pay rescue subsidize ten new cybers
Although only 10% of ransomware victims pay cybercriminally rescue requests, however, those who do so are effectively funding six to ten new attacks, warns Trend Micro. The cyber security solution supplier used data science techniques to analyze data from various sources, including detection telemetry, network infrastructures, blockchain transactions, clandestine forums, chat logs, among other features.
In Ciso Advisor
Tokenization and blockchain: impacts on the financial ecosystem
Much is discussed about the process of transforming physical assets into digital assets through the tokenization process. This process has even considering the regulatory guidelines of Law No. 13.709/2018 (General Data Protection Law - LGPD) and the National Monetary Council Resolution 4893/2021 on Information Security.
By Thiago Rolli and Gabrielle Hernandes in Finsiderrs
Adult content sites have a greater threat to users' safety
According to a survey one of the leading cyber security companies, adult content sites, media streamings and video hosting have more threats to users' safety and privacy.
In Crypto ID
Cybersecurity and Burnout: The importance of protecting mental health from professionals
The information security area is stressful and challenges teams not only in the protection of environments, but also health.
By Alex Amorim in Security Report
Email attacks can handle slips and divert payments
Malpedial software for sale in cybercriminous forums, groups and messaging applications is able to track invaded email accounts to change slips, diverting legitimate payments to the bandits' accounts. The manipulation happens directly to the PDF file, minimizing the chance of discovery by the user.
By Felipe Demartini in Canaltech
Man-Non-The-Side-A peculiar type of attack
What is the Man-O-The-Side attack, and what is his difference to the Man-in-the-Middle attack?
By Anastasia Starikova in Kaspersky Daily
Phone and phishing attacks were discharged in 2022
Security researchers recorded a 76% increase last year in financial losses from phishing attacks, which increasingly use sophisticated tactics and exploit users' lack of knowledge.
In Ciso Advisor
Movie nomination
“On the Line”: a movie about Vishing
- Have you ever watched a film adaptation of a glossary of cybersecurity? Because I did it recently, to my surprise. The South Korean movie On The Line (the original title is Boisus) is undoubtedly an action movie. At the same time, it contains such a large concentration of cybercrime that you could almost recommend it as a didactic material on information security. The consultants hired by the filmmakers seem to know the subject well.
Are you not yet registered on our newsletter to receive this content weekly in the email? Then subscribe through the link below:
https://br.lumiun.com/semana-da-eguranca-na-internet
Share the link with your colleagues and friends.