Daily NCSC-FI news followup 2021-10-02

Conti gang threatens to dump victim data if ransom negotiations leak to reporters

therecord.media/conti-gang-threatens-to-dump-victim-data-if-ransom-negotiations-leak-to-reporters/ The Conti ransomware gang has published a rare public statement today threatening hacked companies that they will leak their stolen files if details or screenshots of the ransom negotiations process are leaked to journalists.

US unites 30 countries to disrupt global ransomware attacks

www.bleepingcomputer.com/news/security/us-unites-30-countries-to-disrupt-global-ransomware-attacks/ Today, U.S. President Joe Biden said that the U.S. will bring together 30 countries to jointly crack down on ransomware gangs behind a barrage of attacks impacting organizations worldwide. “This month, the United States will bring together 30 countries to accelerate our cooperation in combatting cybercrime, improving law enforcement collaboration, stemming the illicit use of cryptocurrency, and engaging on these issues diplomatically, ” President Biden said today.

Know the Four Pillars of Cloud Security That Reduce Data Breach Risk

securityintelligence.com/posts/four-pillars-cloud-security-reduce-data-breach-risk/ Can having a mature, comprehensive cloud security strategy reduce the impact of data breaches on your organization? Results from the latest Cost of a Data Breach Report indicate that taking this approach might produce potential savings for your business.

Tekoäly valitsee leffasi, mutta viekö se myös identiteettisi? “Meille syntyy uusi älyllisen työn yhteiskunta”

www.tivi.fi/uutiset/tv/4dbf5507-338f-499b-8311-3bc857427831 Tekoälyn nopea kehitys merkitsee ennen kokematonta työelämän evoluutiota. Digia kehittää jo ihmisen ja koneen symbioosia. [TILAAJILLE]

Academics discover hidden layer in China’s Great Firewall

therecord.media/academics-discover-hidden-layer-in-chinas-great-firewall/ Introduced in the late 90s, the Great Firewall (GFW) is a system of middleboxes installed at China’s internet exchange points and internet service providers that allow the government to intercept internet traffic, sniff on its content, and block connections to websites and servers the state doesn’t deem acceptable.

PeStudio Overview: Setup, Tutorial and Tips

www.varonis.com/blog/pestudio/ In this article, I will cover what PeStudio is, some of the key features and how you can use it to begin analyzing malware.

October is Cybersecurity Awareness Month! Why being cybersmart matters

www.welivesecurity.com/2021/10/01/october-cybersecurity-awareness-month-being-cyber-smart/ The campaign may last for a month, but we should remember that cybersecurity is a year-round affair

You might be interested in …

Daily NCSC-FI news followup 2020-07-22

Verkkohyökkäys lukitsi autotarvikeliikkeen kassat, salasi tiedot ja sulki ovet Tiedätkö miten varautua, sillä voit olla rikollisen seuraava kohde? yle.fi/uutiset/3-11456333 Kyberturvallisuuskeskus kehottaa varautumaan verkkoiskuun, jotta toimintaa pystyisi jatkamaan mahdollisimman pian. Yrittäjä Raimo Tunkkaria odotti heinäkuisena aamuna ikävä yllätys. Keminmaassa toimivan autotarvike- ja korjaamoyrityksen tietokoneruudulla oli viesti, jossa hakkerit kertoivat lukinneensa yrityksen tiedot. Varaosa Paakkarin asiakas- ja […]

Read More

Daily NCSC-FI news followup 2020-09-10

Viranomainen varoittaa huijausviestistä – varo tätä sähköpostia www.is.fi/digitoday/tietoturva/art-2000006630773.html Apple ID -tunnusten kalastelu on nyt aktiivista. Huijauksen mukaan vastaanottajan Apple ID:tä olisi käytetty luvattomasti muualla Applen iCloud-palveluun kirjautumiseksi. Tämän väitetään tapahtuneen Moskovasta käsin. Mukana on keinotekoinen ip-osoite sekä päivämäärä ja kellonaika. Ne saattavat vaihdella viestistä toiseen. Katso myös meidän twiitti: https://twitter.com/CERTFI/status/1303604786361774080 Ransomware accounted for 41% of […]

Read More

Daily NCSC-FI news followup 2020-04-23

Twitter will remove dubious 5G tweets that could potentially cause harm’ techcrunch.com/2020/04/22/twitter-will-remove-dubious-5g-tweets-that-could-potentially-cause-harm/ “We’re prioritizing the removal of COVID-19 content when it has a call to action that could potentially cause harm, “ First version of Apple and Google’s contact tracing API should be available to developers next week techcrunch.com/2020/04/23/first-version-of-apple-and-googles-contact-tracing-api-should-be-available-to-developers-next-week/ The first version of Apple and […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.