Browsed by
Category: News

Nemty Ransomware Punishes Victims by Posting Their Stolen Data

Nemty Ransomware Punishes Victims by Posting Their Stolen Data

The cybercriminal operation created the Nemta Ransomware site to punish victims for not paying the ransom. It is supposed to scare us, make us guilty. It is widely known that if the fraudster’s strategy does not work, he will look for new ones, and each time he loses his time, which is essential to him. We should be firm and cooperate as a team, defending ourselves against cheaters. Most annoying a criminal is the rejection of his proposal, and submission to him does not exclude other attacks, even the same companies or cooperation. You have no guarantee !!!

https://www.bleepingcomputer.com/news/security/nemty-ransomware-punishes-victims-by-posting-their-stolen-data/?&web_view=true

Japan’s Trend Micro to Help Boost Cybersecurity in Kazakhstan

Japan’s Trend Micro to Help Boost Cybersecurity in Kazakhstan

The Japanese cybersecurity company Trend Micro has signed a scientific and technical cooperation agreement with the Kazakh security company T&T Security to support the government’s “Cyber ​​Security Concept” initiative. The partnership aims to implement local security projects.

https://www.cisomag.com/japans-trend-micro-to-help-boost-cybersecurity-in-kazakhstan/

‘Surfing Attacks’ Could Let Hackers Read Your Texts

‘Surfing Attacks’ Could Let Hackers Read Your Texts

Attacks on the phone are viral and are not something new. However, researchers have noted that the range of ultrasound wave susceptibility can spread to many lites of a surface to activate voice recognition. By adding a second device, an attacker can access the phone’s response.

https://www.nextgov.com/ideas/2020/02/surfing-attacks-could-let-hackers-read-your-texts/163413/

New LTE Network Flaw Could Let Attackers Impersonate 4G Mobile Users

New LTE Network Flaw Could Let Attackers Impersonate 4G Mobile Users

Researchers from Ruhr University Bochum and New York University Abu Dhabi have discovered a vulnerability in the 4G LTE and 5G networks, the problem is characterized by the fact that hackers impersonate users on the system, as well as registration of paid subscriptions on behalf of payers.

https://thehackernews.com/2020/02/lte-network-4g-vulnerability.html

The frightening truth behind free mobile VPN apps

The frightening truth behind free mobile VPN apps

These days our phones are more used as a personal computer. The #Internet is more widespread through mobile services than a machine. The phone user thinks about privacy on the Internet, hence the great interest in installing a VPN on the device. Online activities must be less visible, but it is not entirely clear how private their data will be.

https://www.techradar.com/news/the-frightening-truth-behind-free-mobile-vpn-apps

Microsoft Exchange Server Vulnerability: Mass Scanning Starts as Exploit Details Land

Microsoft Exchange Server Vulnerability: Mass Scanning Starts as Exploit Details Land

Warning!!!

The Microsoft Exchange Server version has a severe vulnerability that allows attackers to reveal or distort e-mail on a massive scale. If the gap remains unpatched within 30 days, it will be exploited by bad actors. According to an anonymous security researcher, work is already underway on attacks. The enormity of lateness seems to be enormous; administrators should already start working.

https://www.cbronline.com/news/microsoft-exchange-server

IT Teams Under Fire As They Battle Against Relentless Alert Storms

IT Teams Under Fire As They Battle Against Relentless Alert Storms

IT teams get varied data that contains a large number of false positives and duplicate alerts that need to be screened to solve the problem. During such a massive data flow, there is little opportunity to focus on real issues. IT teams have less time for more critical tasks, and thorough performance checks before customers experience more severe disruptions. A radical change is needed to reduce the IT load.

https://www.cbronline.com/opinion/it-teams-under-fire