NCSC-FI News followup

Daily NCSC-FI news followup 2020-04-13

How to protect yourself from cyberattacks that exploit Covid-19 The current coronavirus COVID-19 pandemic is changing the business landscape. The most immediate change that has been seen in many countries is the sudden increase in the amount of people working from home. Because of this change, the attack surface has increased significantly, forcing companies to strengthen their cybersecurity measures to ensure they dont suffer at the hands of cybercriminals.

Think Fast: Time Between Disclosure, Patch Release and Vulnerability Exploitation Intelligence for Vulnerability Management, Part Two Attackers are in a constant race to exploit newly discovered vulnerabilities before defenders have a chance to respond. FireEye Mandiant Threat Intelligence research into vulnerabilities exploited in 2018 and 2019 suggests that the majority of exploitation in the wild occurs before patch issuance or within a few days of a patch becoming available.

Kaikkia tapauksia ei ole tuotu julkisuuteen hyökkääjät halvaannuttavat yrityksen koko järjestelmän vaatiakseen lunnaita Verkkorikolliset ovat alkaneet metsästää suurta saalista eivätkä tyydy enää yksittäisten koneiden kaappaamiseen, varoittaa Kyberturvallisuuskeskuksen johtaja Kalle Luukkainen.

Over 500,000 Zoom accounts sold on hacker forums, the dark web Over 500 hundred thousand Zoom accounts are being sold on the dark web and hacker forums for less than a penny each, and in some cases, given away for free.

Dell releases new tool to detect BIOS attacks Dell makes new tool named SafeBIOS Events & Indicators of Attack available for download for all Dell commercial PCs.

5g-verkkoja pelkäävät salaliitto­teoreetikot ryhtyivät polttamaan tukiasemia Britanniassa ja Hollannissa, Facebook suitsii yllytystä 5g-teknologian ja koronaviruksen leviämisen väliseen yhteyteen uskovat ihmiset ovat sabotoineet tukiasemia ja uhkailleet verkkojen asentajia. Uuden teknologian vastainen liikehdintä on levinnyt jopa 30 maahan, myös Suomeen.

Look at the same phishing campaign 3 months apart

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.