In edition nº 127 of Internet Security Week , hacker attack takes 15 minutes, phishing in disguise, malware steals Facebook ad account, new generation of ransomware and much more.
News
As Microsoft blocks Office macros, hackers find new ways to attack
Hackers who typically distributed malware through phishing attachments with malicious macros gradually changed tactics after Microsoft Office began blocking them by default, switching to new file types such as ISO, RAR, and Windows Shortcut (LNK) attachments. .
By Bill Toulas in Bleeping Computer
Criminals take 15 minutes to attack after discovering security flaws
Cybercriminals can take just 15 minutes to start exploiting a security flaw from the moment it is revealed, relying precisely on the idea that organizations will take longer to apply fixes to their systems.
By Felipe Demartini on Canaltech
Undercover phishing: be wary of emails marked as safe
When sending phishing emails or malicious attachments, scammers deploy a series of tricks to persuade you to click a link or open a file. One such trick is to add all types of stamps possible, indicating that the attached link or file is trustworthy.
By Roman Dedenok in Kaspersky Daily
Rug pull: scam affects cryptocurrency investors
Rug pull is a type of scam in which creators of a certain project seek to attract investors to a new cryptocurrency with the intention of then fleeing with the funds raised.
By Martina López in We Live Secutiry
Malware steals Facebook business and ad accounts
Facebook is being targeted by a cybercriminal operation called Ducktail, which aims to take control of the social network's commercial and advertising accounts for financial theft.
In CISO Advisor
DDoS Attack Trends in 2022: Ultra-Short, Powerful, Multi-Vector Attacks
The political situation in Europe and the rest of the world deteriorated sharply in 2021. This affected the nature, intensity and geography of DDoS attacks, which began to be actively used for political purposes.
By Lawrence Abrams in Bleeping Computer
Leak may have exposed 300,000 documents from a group of real estate companies in Brazil
A major data leak would have hit the Lopes real estate network, which includes brands such as New Place, Local and VNC. In total, there would be more than 300,000 documents obtained by cybercriminals, including negotiations between customers, proposals and internal email exchanges, possibly placing personal information and sensitive details in the hands of unauthorized third parties.
By Felipe Demartini on Canaltech
The new generation of ransomware is now multiplatform
Lately, ransomware groups are increasingly targeting not only Windows computers, but also Linux devices and ESXi virtual machines.
By Julia Glazova in Kaspersky Daily
Fake invoice: criminals pretend to be an operator to spread the Grandoreiro trojan
Criminals impersonate the operator Vivo to spread a threat capable of obtaining victims' banking information after being installed.
By Daniel Cunha Barbosa in We Live Secutiry
Lockbit Interview: “There are more than 100 people in the operation”
The RaaS (ransomware as a service) Lockbit 3.0 operation already has more than one hundred people, revealed the leader of the operation in an interview with the Italian portal Red Hot Cyber.
In CISO Advisor
eBook
[eBook] How to Avoid Data Leakage in the Company
- Complete material on Data Leakage, access control and internet security for companies
- Available for download
- Free
Are you not yet subscribed to our newsletter to receive this content weekly by email? Then sign up using the link below:
https://br.lumiun.com/semana-da-seguranca-na-internet
Share the link with your colleagues and friends.