We have reached the seventieth edition of Internet Security Week ! I confess that it is a brand that makes us proud, therefore, in this edition we have brought a very special course on cybersecurity!
News
Grupo Fleury is a new victim of ransomware cyberattack
Another Brazilian company is the victim of a ransomware cyber attack. After the attack on the American unit of JBS, the largest meat processing company in the world, it was now the turn of Grupo Fleury, one of the most renowned diagnostic medicine companies in the country.
By Erivelto Tadeu in CISO Advisor
Ransomware attacks explode in Brazil with an increase of 92% since the beginning of the year
Responsible for generating financial losses and paralyzing company activities, ransomware attacks follow a huge upward trend in Brazil. According to data from Check Point Software, actions of this type have increased by 92% in the country since the beginning of 2021, following a global trend that registered a 41% increase in attacks in the period.
By Felipe Gugelmin on Canaltech
Ransomware: 80% of victims who pay end up being attacked again
Furthermore, payment does not guarantee that operations will return to normal. Of those surveyed, 46% regained access to their data, but some or all of it was corrupted. And 25% of respondents said a ransomware attack led to the closure of their organization.
By Arielle Waldman on TechTarget
PIX scam scheduled: understand the rumor circulating on social media
Message warns that criminals are asking victims to return alleged payments, but the Central Bank says the content is nothing more than rumors.
In G1
“Amateur” ransomware hid encryption key in the code itself
“Black Kingdom” was written in Python by “amateur developers”, containing an encryption implementation with several errors, allowing file recovery using a “hardcoded” key in the malicious application code itself.
By Marc Rivero on Securelist
Data leaks do not generate compensation if damage is not proven
A woman had her data leaked by Eletropaulo. For the judge, the damage caused must be proven in order to compensate for moral damage, even if there is an undue leak.
In Migalhas
Advantages and disadvantages of blocking access to social networks in companies
A question that affects most business owners, managers and IT professionals is whether or not to block access to social networks during employees' working hours.
By Kelvin Zimmer on Lumiun Blog
Criminals use fake call center support to infect with ransomware
The highly sophisticated campaign is being coordinated by a criminal group called BazarCall, which uses false billing notices for unsolicited services to trick victims into contacting a criminal posing as an attendant by phone and leading to infection. by downloading a contaminated file.
By Felipe Demartini on Canaltech
Process ghosting: new hacking technique tampers with image
Researchers at cybersecurity firm Elastic Security have discovered a new hacking tactic used by cybercriminals to evade security detections that uses image tampering to stealthily deploy malicious code on a Windows system.
In CISO Advisor
Events
(ISC)2 announces free ransomware protection course
- Online course
- Duration: 2h
- Free until July 31, 2021
Are you not yet subscribed to our newsletter to receive this content weekly by email? Then sign up using the link below:
https://conteudo.lumiun.com/semana-da-seguranca-na-internet
Share the link with your colleagues and friends.