internet security

Internet Security Week – Edition No. 113

In edition nº 113 of Internet Security Week , the RJ Finance Department is a victim of ransomware, an efficient and affordable solution against data leaks for companies, 6 YouTube channels on malware analysis and much more.


News

Ransomware announces RJ Finance Department as victim

The group that operates the Lockbit ransomware announced the Rio de Janeiro State Finance Department as one of its victims. On its leaks website, the group reported having seized a total of 420GB of data from the Secretariat. The group's post adds that on April 25, 2022 at 8:00 am (supposedly GMT) the data will begin to be published. The group does not report the contents of the 2,338,476 files allegedly in its possession.

In CISO Advisor

McDonald's gives details about customer data leak in Brazil

McDonald's Brazilian operation was the victim of a cybercriminal attack, which resulted in the exposure of personal data of some of its customers. The warning appears in an email that has been sent to affected consumers since at least the 17th, informing them about the incident and the possibility of phishing scams via email or instant messages.

By Felipe Demartini on Canaltech

Anti-Ransomware Strategies

Ransomware attacks no longer make headlines — reports of new victims appear daily. Therefore, it is more important than ever for companies to have a well-designed, multi-level strategy to protect against this threat.

By Hugh Aver on Kaspersky Daily

High-impact flaws discovered in the UEFI of Lenovo notebooks

ESET researchers discovered and analyzed three vulnerabilities affecting several Lenovo notebook models. The first two vulnerabilities – CVE-2021-3971, CVE-2021-3972 – affect firmware drivers for UEFI that were initially created to be used only during the manufacturing process of Lenovo consumer notebooks. Unfortunately, these machines were also mistakenly included in the production of ISO images for BIOS without being properly disabled.

By Martin Smolár in We Live Security

The most efficient and affordable solution against data leaks in companies

Data leaks are a serious and current security incident that can be easily prevented. When companies take the correct measures and attitudes, this type of security incident can be resolved.

By Kelvin Zimmer on Lumiun Blog

Cybercrime opens industrial secrets marketplace

There is a new clandestine market created by cybercrime, exclusively for the sale of data and documents from companies whose networks and servers have been hacked: it is called Industrial Spy and it is on the deep web with the address “.onion”. The marketplace has a quantity of material that allows it to even offer some data for free to its members.

In CISO Advisor

Emotet virus gains new capabilities and increases spread rate by 10 times

The Emotet malware remains committed to maintaining its leadership in the ranking of the most widespread threats in the world, increasing its dissemination rate by more than 10 times in March. During the period, there were more than 30 thousand phishing emails sent with the virus, compared to just under three thousand registered in February 2022.

By Felipe Demartini on Canaltech

Fakecalls: discover the Trojan that imitates phone calls

Cybercriminals are always creating increasingly sophisticated malware. Last year, for example, an unusual banking Trojan called Fakecalls emerged. In addition to the usual spying features, it has an interesting ability to “talk” to the victim disguised as a bank employee.

By Igor Golovin on Kaspersky Daily


Channels

The reverse engineering process is a complex task that can be difficult to learn. The amount of software and tools available makes the process even more difficult. For this reason, we decided to separate this list of seven YouTube channels created by ESET, which provide very interesting and useful materials and content on how to apply reverse engineering to analyze malware.

Reversing Hub

  • Duration: +10 hours
  • Level: Initial
  • English language

Cyber ​​CDH | Tools, tactics and techniques

  • Duration: +10 hours
  • Level: Initial
  • English language

Kindred Security

  • Duration: +4 hours
  • Level: Initial
  • English language

hasherezade

  • Duration: +9 hours
  • Intermediate level
  • English language

MalwareAnalysisForHedgehogs

  • Duration: +15 hours
  • Advanced level
  • English language

OALabs

  • Duration: +35 hours
  • Level: Intermediate – Advanced
  • English language

Are you not yet subscribed to our newsletter to receive this content weekly by email? Then sign up using the link below:

https://br.lumiun.com/semana-da-seguranca-na-internet

Share the link with your colleagues and friends.

Related Posts