Daily NCSC-FI news followup 2020-04-13

How to protect yourself from cyberattacks that exploit Covid-19

www.pandasecurity.com/mediacenter/business/cyberattacks-exploit-covid-19/ The current coronavirus COVID-19 pandemic is changing the business landscape. The most immediate change that has been seen in many countries is the sudden increase in the amount of people working from home. Because of this change, the attack surface has increased significantly, forcing companies to strengthen their cybersecurity measures to ensure they dont suffer at the hands of cybercriminals.

Think Fast: Time Between Disclosure, Patch Release and Vulnerability Exploitation Intelligence for Vulnerability Management, Part Two

www.fireeye.com/blog/threat-research/2020/04/time-between-disclosure-patch-release-and-vulnerability-exploitation.html Attackers are in a constant race to exploit newly discovered vulnerabilities before defenders have a chance to respond. FireEye Mandiant Threat Intelligence research into vulnerabilities exploited in 2018 and 2019 suggests that the majority of exploitation in the wild occurs before patch issuance or within a few days of a patch becoming available.

Kaikkia tapauksia ei ole tuotu julkisuuteen hyökkääjät halvaannuttavat yrityksen koko järjestelmän vaatiakseen lunnaita

www.tivi.fi/uutiset/tv/f712b462-7905-4a05-8d9b-155db4e4c60d Verkkorikolliset ovat alkaneet metsästää suurta saalista eivätkä tyydy enää yksittäisten koneiden kaappaamiseen, varoittaa Kyberturvallisuuskeskuksen johtaja Kalle Luukkainen.

Over 500,000 Zoom accounts sold on hacker forums, the dark web

www.bleepingcomputer.com/news/security/over-500-000-zoom-accounts-sold-on-hacker-forums-the-dark-web/ Over 500 hundred thousand Zoom accounts are being sold on the dark web and hacker forums for less than a penny each, and in some cases, given away for free.

Dell releases new tool to detect BIOS attacks

www.zdnet.com/article/dell-releases-new-tool-to-detect-bios-attacks/ Dell makes new tool named SafeBIOS Events & Indicators of Attack available for download for all Dell commercial PCs.

5g-verkkoja pelkäävät salaliitto­teoreetikot ryhtyivät polttamaan tukiasemia Britanniassa ja Hollannissa, Facebook suitsii yllytystä

www.hs.fi/ulkomaat/art-2000006473240.html 5g-teknologian ja koronaviruksen leviämisen väliseen yhteyteen uskovat ihmiset ovat sabotoineet tukiasemia ja uhkailleet verkkojen asentajia. Uuden teknologian vastainen liikehdintä on levinnyt jopa 30 maahan, myös Suomeen.

Look at the same phishing campaign 3 months apart


You might be interested in …

Daily NCSC-FI news followup 2020-03-23

Protecting health care www.kaspersky.com/blog/protecting-healthcare-organizations/34269/ Health-care facilities are struggling with the current coronavirus epidemic, so we must help them with cyberprotection. We are offering free six-month licenses for our core solutions. For the average, law-abiding person, the coronavirus COVID-19 is simply a health hazard. Unfortunately, some cybercriminals perceive the epidemic as an additional opportunity to launch […]

Read More

Daily NCSC-FI news followup 2021-03-08

A Basic Timeline of the Exchange Mass-Hack krebsonsecurity.com/2021/03/a-basic-timeline-of-the-exchange-mass-hack/ Sometimes when a complex story takes us by surprise or knocks us back on our heels, it pays to revisit the events in a somewhat linear fashion. Heres a brief timeline of what we know leading up to last weeks mass-hack, when hundreds of thousands of Microsoft […]

Read More

Daily NCSC-FI news followup 2021-04-12

Israel appears to confirm it carried out cyberattack on Iran nuclear facility www.theguardian.com/world/2021/apr/11/israel-appears-confirm-cyberattack-iran-nuclear-facility Israel appeared to confirm claims that it was behind a cyber-attack on Irans main nuclear facility on Sunday, which Tehrans nuclear energy chief described as an act of terrorism that warranted a response against its perpetrators. Sisä-Suomen poliisilaitoksella on tutkittavana useita WhatsApp-sovelluksen […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.