internet safety week

Internet Security Week – Edition No. 136

In edition nº 136 of Internet Security Week , the 10 most common financial scams in Brazil, Banco do Brasil would be the next hacker target, what is IT governance and why it is important for companies and much more.


News

These are the 10 most common financial scams in Brazil

Febraban (Brazilian Federation of Banks) has been warning, since the beginning of the month, about the incidence of more and more scams against Brazilian citizens. The alerts are part of an awareness campaign that listed the 10 main types of fraud most commonly carried out by criminals, with an eye on personal data and, mainly, financial information.

By Felipe Demartini on Canaltech

Harly: another subscription Trojan on Google Play

It is common to find all types of malware hidden in what appear to be harmless applications in official stores such as Google Play. Unfortunately, even if the platform is carefully reviewed, moderators are not always able to catch these apps before they are published.

By Tatyana Shishkova in Kaspersky Daily

Banco do Brasil in the crosshairs of the hacker who leaked GTA 6

According to the Twitter profile “Michael” (@LegacyKillaHD), which closely observed the attacks, “evidence emerged yesterday showing that last week the young Englishman was attacking companies other than Rockstar and Uber, including Banco do Brasil” .

In CISO Advisor

Shadow IT: how to manage the security risks of this phenomenon

The use of unauthorized hardware and software by company employees is a problem that has increased in times of home office.

By Phil Muncaster in We Live Security

“Toolkit” from the Brute Ratel group is being shared for free in hacker communities

For those unfamiliar with Brute Ratel C4 (BRC4), it is a post-exploitation toolkit created by Chetan Nayak, a former Red Teamer at Mandiant and CrowdStrike.

By Lawrence Abrams in Bleeping Computer

What is IT governance and why is it important for companies

IT governance consists of a sector belonging to information technology that seeks to optimize processes and ensure that technological resources are used efficiently and assertively. To help you better understand how this process works, read this article!

By Kelvin Zimmer on Lumiun Blog

A new method of infecting PCs does not depend on executable files or even macros from the Office suite, the user simply needs to hover the mouse over a link for the contamination chain to begin. The attack, associated with a Russian cybercriminal group, uses a PowerPoint presentation and the name of the OECD (Organization for Economic Co-operation and Development) to claim high-ranking victims.

By Felipe Demartini on Canaltech

Browser Extensions: More Dangerous Than You Think

Each of us has probably installed some kind of browser extension at least once: an ad blocker, an online translator, a spell checker, or something else. However, we rarely stop to think: is the extension really safe?

By Anastasia Starikova in Kaspersky Daily

Phishing attacks grow 230% in the first half of the year

Ransomware attacks and threats targeting Android devices are among the main risks for companies in Brazil, according to the ESET Security Report 2022. The report carried out by the leading company in proactive threat detection presents information about the digital security scenario in the environment Brazilian corporate sector during the first half of this year.

In CISO Advisor


Podcast

LGPD: understand what has changed and what the new challenges are – We Live Security (by ESET)

  • Check out the new episode of the Conexão Segura podcast. This time, we highlight the changes generated by the implementation of the LGPD and the challenges faced by companies in adapting to the law.
  • Free

Are you not yet subscribed to our newsletter to receive this content weekly by email? Then sign up using the link below:

https://br.lumiun.com/semana-da-seguranca-na-internet

Share the link with your colleagues and friends.

Related Posts