In issue 158 of Internet Security Week , we look at how HR works in cybercrime, companies that pay ransoms finance other attacks, email attacks can manipulate bills and divert payments, and much more.
News
Mobile banking virus scams nearly doubled in 2022
Everyone knows that banking viruses are the main focus of cybercriminals' attacks against ordinary users. But now this trend appears quantified in numbers, with 196,400 attempted attacks using financial Trojans recorded throughout 2022; the number represents almost double the number observed last year and is the highest total since 2016.
By Felipe Demartini on Canaltech
Criminal HR: How Recruitment Works on the Dark Web
Illegal businesses in the shadow economy need employees just as much as their legal counterparts. Let's take a look at how "dark HR" works.
By Dmitry Reznikov in Kaspersky Daily
Ransom-Paying Companies Subsidize Ten New Cyberattacks
Although only 10% of ransomware victims pay the ransom demands made by cybercriminals, those who do are effectively funding six to ten new attacks, warns Trend Micro. The cybersecurity solutions provider used data science techniques to analyze data from various sources, including detection telemetry, network infrastructure, blockchain transactions, underground forums, chat logs, and other resources.
In CISO Advisor
Tokenization and blockchain: impacts on the financial ecosystem
There is much debate about the process of transforming physical assets into digital assets through tokenization. This process also takes into account the regulatory guidelines of Law No. 13,709/2018 (General Data Protection Law – LGPD) and National Monetary Council Resolution 4893/2021 on information security.
By Thiago Rolli and Gabrielle Hernandes in Finsiders
Adult content sites pose a greater threat to user safety
According to research from a leading cybersecurity firm, adult content, media streaming, and video hosting sites pose the most threats to users' security and privacy.
In Crypto ID
Cybersecurity and Burnout: The Importance of Protecting Professionals' Mental Health
The Information Security area is stressful and challenges teams not only in protecting environments, but also in protecting health.
By Alex Amorim in Security Report
Email attacks can manipulate bills and divert payments
Malicious software sold on cybercriminal forums, groups, and messaging apps can track hacked email accounts to alter bills, diverting legitimate payments to the criminals' accounts. The manipulation occurs directly in the PDF file, minimizing the chance of detection by the user.
By Felipe Demartini on Canaltech
Man-on-the-side – a peculiar type of attack
What is a man-on-the-side attack, and how is it different from a man-in-the-middle attack?
By Anastasia Starikova in Kaspersky Daily
Phone and phishing attacks increased in 2022
Security researchers recorded a 76% increase last year in financial losses from phishing attacks, which increasingly use sophisticated tactics and exploit users' lack of knowledge.
In CISO Advisor
Movie Recommendation
“On the Line”: a film about vishing
- Have you ever watched a film adaptation of a cybersecurity glossary? Well, I did recently, to my surprise. The South Korean film "On the Line" (original title: Boiseu) is undoubtedly an action film. At the same time, it contains such a high concentration of cybercrime that it could almost be recommended as educational material on information security. The consultants hired by the filmmakers seem to be well-versed in the subject.
Not yet subscribed to our newsletter to receive this content weekly in your email? Then sign up using the link below:
https://br.lumiun.com/semana-da-seguranca-na-internet
Share the link with your colleagues and friends.