internet safety week

Internet Security Week – Edition No. 70

We have reached the seventieth edition of Internet Security Week ! I confess that it is a brand that makes us proud, therefore, in this edition we have brought a very special course on cybersecurity!

In the edition, ransomware attacks explode in Brazil, new hacking technique, fake call center support and much more.

News

Grupo Fleury is a new victim of ransomware cyberattack

Another Brazilian company is the victim of a ransomware cyber attack. After the attack on the American unit of JBS, the largest meat processing company in the world, it was now the turn of Grupo Fleury, one of the most renowned diagnostic medicine companies in the country.

By Erivelto Tadeu in CISO Advisor

Ransomware attacks explode in Brazil with an increase of 92% since the beginning of the year

Responsible for generating financial losses and paralyzing company activities, ransomware attacks follow a huge upward trend in Brazil. According to data from Check Point Software, actions of this type have increased by 92% in the country since the beginning of 2021, following a global trend that registered a 41% increase in attacks in the period.

By Felipe Gugelmin on Canaltech

Ransomware: 80% of victims who pay end up being attacked again

Furthermore, payment does not guarantee that operations will return to normal. Of those surveyed, 46% regained access to their data, but some or all of it was corrupted. And 25% of respondents said a ransomware attack led to the closure of their organization.

By Arielle Waldman on TechTarget

PIX scam scheduled: understand the rumor circulating on social media

Message warns that criminals are asking victims to return alleged payments, but the Central Bank says the content is nothing more than rumors.

In G1

“Amateur” ransomware hid encryption key in the code itself

“Black Kingdom” was written in Python by “amateur developers”, containing an encryption implementation with several errors, allowing file recovery using a “hardcoded” key in the malicious application code itself.

By Marc Rivero on Securelist

Data leaks do not generate compensation if damage is not proven

A woman had her data leaked by Eletropaulo. For the judge, the damage caused must be proven in order to compensate for moral damage, even if there is an undue leak.

In Migalhas

Advantages and disadvantages of blocking access to social networks in companies

A question that affects most business owners, managers and IT professionals is whether or not to block access to social networks during employees' working hours.

By Kelvin Zimmer on Lumiun Blog

Criminals use fake call center support to infect with ransomware

The highly sophisticated campaign is being coordinated by a criminal group called BazarCall, which uses false billing notices for unsolicited services to trick victims into contacting a criminal posing as an attendant by phone and leading to infection. by downloading a contaminated file.

By Felipe Demartini on Canaltech

Process ghosting: new hacking technique tampers with image

Researchers at cybersecurity firm Elastic Security have discovered a new hacking tactic used by cybercriminals to evade security detections that uses image tampering to stealthily deploy malicious code on a Windows system.

In CISO Advisor


Events

(ISC)2 announces free ransomware protection course

  • Online course
  • Duration: 2h
  • Free until July 31, 2021

 

Are you not yet subscribed to our newsletter to receive this content weekly by email? Then sign up using the link below:

https://conteudo.lumiun.com/semana-da-seguranca-na-internet

Share the link with your colleagues and friends.

lumiun dns - web content filter
Related Posts