Daily NCSC-FI news followup 2020-07-03

New Apple macOS Big Sur feature to hamper adware operations

www.zdnet.com/article/new-apple-macos-big-sur-feature-to-hamper-adware-operations/#ftag=RSSbaffb68 Apple has disabled the ability to silently install macOS profiles from the CLI in macOS 11, a measure that was widely employed by adware and malware gangs.

Windows 10: Microsoft Defender ATP now rates your security configurations

www.zdnet.com/article/windows-10-microsoft-defender-atp-now-rates-your-security-configurations/#ftag=RSSbaffb68 New Microsoft Defender ATP service will help weed out unneeded administrator accounts before attackers find them.. Microsoft Defender Advanced Threat Protection (ATP) now gives your devices and network a security score that tells admins the health of their environment based on how it’s configured.

LinkedIn says iOS clipboard snooping after every key press is a bug, will fix

www.zdnet.com/article/linkedin-says-ios-clipboard-snooping-after-every-key-press-is-a-bug-will-fix/#ftag=RSSbaffb68 In a video shared on Twitter, the Urspace developer showed how LinkedIn’s app was reading the clipboard content after every user key press, even accessing the shared clipboard feature that allows iOS apps to read content from a user’s macOS clipboard.

Syytös Teliaa vastaan: Asiakkaiden reitittimet kaapattavissa Ei koske Suomea

www.is.fi/digitoday/tietoturva/art-2000006561336.html?ref=rss Teleoperaattori Telia selvittää kummallista haavoittuvuusraporttia, joka julkaistiin verkossa kesäkuun lopussa. Raportin mukaan Telian liettualaisten asiakkaiden reitittimet on mahdollista kaapata ja luoda niistä Liettuan voimakkain, pysyvin ja huomaamattomin bottiverkko.

Building Security Strategies in Sub-Saharan Africa: Trends and Concerns

www.darkreading.com/operations/building-security-strategies-in-sub-saharan-africa-trends-and-concerns/d/d-id/1338276 IDC data shows sub-Saharan Africa’s ICT market is predicted to grow from $95.4 billion in 2020 to $104.2 billion by 2023. Technologies including cloud, social media, and big data are all key areas of growth and components to a sharp rise in digital crime. The World Economic Forum considers cybercrime one of the three greatest threats to Africa, where sub-Saharan nations lose millions of dollars to . cyberattacks each year a very large sum in proportion to their GDP.

You might be interested in …

Daily NCSC-FI news followup 2020-03-20

GUIDANCE ON THE ESSENTIAL CRITICAL INFRASTRUCTURE WORKFORCE www.cisa.gov/publication/guidance-essential-critical-infrastructure-workforce MEMORANDUM ON IDENTIFICATION OF ESSENTIAL CRITICAL INFRASTRUCTURE WORKERS DURING COVID-19 RESPONSE Sodinokibi Ransomware Data Leaks Now Sold on Hacker Forums www.bleepingcomputer.com/news/security/sodinokibi-ransomware-data-leaks-now-sold-on-hacker-forums/ Ransomware victims who do not pay a ransom and have their stolen files leaked are now facing a bigger nightmare as other hackers and criminals sell […]

Read More

Daily NCSC-FI news followup 2021-10-18

“Killware”: Is it just as bad as it sounds? blog.malwarebytes.com/cybercrime/2021/10/killware-is-it-just-as-bad-as-it-sounds/ On October 12, after interviewing US Secretary of Homeland Security Alejandro Mayorkas, USA TODAY’s editorial board warned its readers about a dangerous new form of cyberattack under this eye-catching headline: “The next big cyberthreat isn’t ransomware. It’s killware. And it’s just as bad as it […]

Read More

Daily NCSC-FI news followup 2021-10-22

Ransomware: Looking for weaknesses in your own network is key to stopping attacks www.zdnet.com/article/ransomware-looking-for-weaknesses-in-your-own-network-is-key-to-stopping-attacks/ Ransomware is a major cybersecurity threat to organisations around the world, but it’s possible to reduce the impact of an attack if you have a thorough understanding of your own network and the correct protections are in place. While the best […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.