internet safety week

Internet Security Week – Edition No. 127

In edition nº 127 of Internet Security Week , hacker attack takes 15 minutes, phishing in disguise, malware steals Facebook ad account, new generation of ransomware and much more.


News

As Microsoft blocks Office macros, hackers find new ways to attack

Hackers who typically distributed malware through phishing attachments with malicious macros gradually changed tactics after Microsoft Office began blocking them by default, switching to new file types such as ISO, RAR, and Windows Shortcut (LNK) attachments. .

By Bill Toulas in Bleeping Computer

Criminals take 15 minutes to attack after discovering security flaws

Cybercriminals can take just 15 minutes to start exploiting a security flaw from the moment it is revealed, relying precisely on the idea that organizations will take longer to apply fixes to their systems.

By Felipe Demartini on Canaltech

Undercover phishing: be wary of emails marked as safe

When sending phishing emails or malicious attachments, scammers deploy a series of tricks to persuade you to click a link or open a file. One such trick is to add all types of stamps possible, indicating that the attached link or file is trustworthy.

By Roman Dedenok in Kaspersky Daily

Rug pull: scam affects cryptocurrency investors

Rug pull is a type of scam in which creators of a certain project seek to attract investors to a new cryptocurrency with the intention of then fleeing with the funds raised.

By Martina López in We Live Secutiry

Malware steals Facebook business and ad accounts

Facebook is being targeted by a cybercriminal operation called Ducktail, which aims to take control of the social network's commercial and advertising accounts for financial theft.

In CISO Advisor

DDoS Attack Trends in 2022: Ultra-Short, Powerful, Multi-Vector Attacks

The political situation in Europe and the rest of the world deteriorated sharply in 2021. This affected the nature, intensity and geography of DDoS attacks, which began to be actively used for political purposes.

By Lawrence Abrams in Bleeping Computer

Leak may have exposed 300,000 documents from a group of real estate companies in Brazil

A major data leak would have hit the Lopes real estate network, which includes brands such as New Place, Local and VNC. In total, there would be more than 300,000 documents obtained by cybercriminals, including negotiations between customers, proposals and internal email exchanges, possibly placing personal information and sensitive details in the hands of unauthorized third parties.

By Felipe Demartini on Canaltech

The new generation of ransomware is now multiplatform

Lately, ransomware groups are increasingly targeting not only Windows computers, but also Linux devices and ESXi virtual machines.

By Julia Glazova in Kaspersky Daily

Fake invoice: criminals pretend to be an operator to spread the Grandoreiro trojan

Criminals impersonate the operator Vivo to spread a threat capable of obtaining victims' banking information after being installed.

By Daniel Cunha Barbosa in We Live Secutiry

Lockbit Interview: “There are more than 100 people in the operation”

The RaaS (ransomware as a service) Lockbit 3.0 operation already has more than one hundred people, revealed the leader of the operation in an interview with the Italian portal Red Hot Cyber.

In CISO Advisor


eBook

[eBook] How to Avoid Data Leakage in the Company

  • Complete material on Data Leakage, access control and internet security for companies
  • Available for download
  • Free

Are you not yet subscribed to our newsletter to receive this content weekly by email? Then sign up using the link below:

https://br.lumiun.com/semana-da-seguranca-na-internet

Share the link with your colleagues and friends.

Related Posts