internet safety week

Internet Security Week – Edition No. 70

We arrived at the seventy -edition of Internet Security Week ! I confess that it is a brand that causes us pride, so in this edition we brought a very special cybersecurity course!

In the edition, ransomware attacks explode in Brazil, new hacking technique, fake call center support and more.

News

Fleury Group is a new victim of ransomware cyberathel

Another Brazilian company is a victim of cyberatoque of ransomware. Following the attack against the American JBS American unit, the world's largest meat processing company, it has now been the turn of the Fleury group, one of the most renowned diagnostic medicine companies in the country.

By Erivelto tadeus in Ciso Advisor

Ransomware attacks explode in Brazil up 92% since the beginning of the year

Responsible for generating financial losses and paralyzing business activities, ransomware attacks follow a big trend in Brazil. According to Check Point Software data, shares of the type increased by 92% in the country since the early 2021, following a global trend that recorded a 41% increase in attacks in the period.

By Felipe Gugelmin in Canaltech

Ransomware: 80% of victims who pay end up being attacked again

In addition, payment does not guarantee that operations return to normal. Of the surveyed, 46% recovered access to their data, but some or all of them were corrupted. And 25% of respondents said a ransomware attack led to the closure of their organization.

By Arielle Waldman in Techtarget

Scheduled pix scam: Understand the rumor that circulates on social networks

Message warns that criminals are asking victims to return alleged payment, but Central Bank says content is nothing more than rumor.

In g1

“Amateur” ransomware hidden encryption key in the code itself

Black Kingdom was written in Python by “amateur developers” containing a multiple encryption implementation, allowing file recovery using a “hardcoded” key in the malicious application code itself.

By Marc Rivero in Securelist

Data leakage does not generate indemnity if damage is not proven

A woman had her data leaked by Eletropaulo. For the judge, the damage caused to compensation for moral damage must be proved, even though the improper leak is configured.

In crumbs

Advantages and disadvantages of blocking access to social networks in companies

Doubt that affects much of the entrepreneurs, managers and IT professionals is whether or not to block access to social networks during employees' working hours.

By Kelvin Zimmer in Lumiun Blog

Criminals use false call center support to contaminate with ransomware

The high level of sophistication campaign is being coordinated by a criminal group named Bazarall, which uses false service collection notices to induce victims to contact the phone, with a criminals who passes by attendant and leads to infection by downloading an contaminated file.

By Felipe Demartini in Canaltech

Process Ghosting: New Technique of Hacking Adultery Image

Cyber ​​security company researchers Elastic Security discovered a new cybercriminals hacking tactic to escape security detections that use image tampering to steal malicious code on a Windows system.

In Ciso Advisor


Events

(ISC) 2 Announces free ransomware protection course

  • Online course
  • Duration: 2h
  • Free until July 31, 2021

 

Are you not yet registered on our newsletter to receive this content weekly in the email? Then subscribe through the link below:

https://conteudo.lumiun.com/semana-da-eguranca-na-internet

Share the link with your colleagues and friends.

Lumiun DNS Mikrotik
Lumiun DNS integration with pfsense software
Lumiun DNS Free Trial
Related Posts