We arrived at the seventy -edition of Internet Security Week ! I confess that it is a brand that causes us pride, so in this edition we brought a very special cybersecurity course!
News
Fleury Group is a new victim of ransomware cyberathel
Another Brazilian company is a victim of cyberatoque of ransomware. Following the attack against the American JBS American unit, the world's largest meat processing company, it has now been the turn of the Fleury group, one of the most renowned diagnostic medicine companies in the country.
By Erivelto tadeus in Ciso Advisor
Ransomware attacks explode in Brazil up 92% since the beginning of the year
Responsible for generating financial losses and paralyzing business activities, ransomware attacks follow a big trend in Brazil. According to Check Point Software data, shares of the type increased by 92% in the country since the early 2021, following a global trend that recorded a 41% increase in attacks in the period.
By Felipe Gugelmin in Canaltech
Ransomware: 80% of victims who pay end up being attacked again
In addition, payment does not guarantee that operations return to normal. Of the surveyed, 46% recovered access to their data, but some or all of them were corrupted. And 25% of respondents said a ransomware attack led to the closure of their organization.
By Arielle Waldman in Techtarget
Scheduled pix scam: Understand the rumor that circulates on social networks
Message warns that criminals are asking victims to return alleged payment, but Central Bank says content is nothing more than rumor.
In g1
“Amateur” ransomware hidden encryption key in the code itself
Black Kingdom was written in Python by “amateur developers” containing a multiple encryption implementation, allowing file recovery using a “hardcoded” key in the malicious application code itself.
By Marc Rivero in Securelist
Data leakage does not generate indemnity if damage is not proven
A woman had her data leaked by Eletropaulo. For the judge, the damage caused to compensation for moral damage must be proved, even though the improper leak is configured.
In crumbs
Advantages and disadvantages of blocking access to social networks in companies
Doubt that affects much of the entrepreneurs, managers and IT professionals is whether or not to block access to social networks during employees' working hours.
By Kelvin Zimmer in Lumiun Blog
Criminals use false call center support to contaminate with ransomware
The high level of sophistication campaign is being coordinated by a criminal group named Bazarall, which uses false service collection notices to induce victims to contact the phone, with a criminals who passes by attendant and leads to infection by downloading an contaminated file.
By Felipe Demartini in Canaltech
Process Ghosting: New Technique of Hacking Adultery Image
Cyber security company researchers Elastic Security discovered a new cybercriminals hacking tactic to escape security detections that use image tampering to steal malicious code on a Windows system.
In Ciso Advisor
Events
(ISC) 2 Announces free ransomware protection course
- Online course
- Duration: 2h
- Free until July 31, 2021
Are you not yet registered on our newsletter to receive this content weekly in the email? Then subscribe through the link below:
https://conteudo.lumiun.com/semana-da-eguranca-na-internet
Share the link with your colleagues and friends.