That's not only work, that's mindset and passion!
Monday, 27 July 2020
Thursday, 23 July 2020
Phishing Campaigns During COVID-19.
During the COVID19 pandemic number of phishing
campaigns extremely increased.
Here are the most “popular” email subjects used
in phishing campaigns in 2020:
1.
Password
change/check required
2.
COVID-19 Awareness/News
3.
Vacation
Policy Update
4.
Rescheduled
meetings due to COVID-19
5.
Coronavirus
Stimulus Checks
6.
Fedex Tracking
7.
Zoom: Restriction Notice Alert
8.
Jira: [JIRA] A task was assigned to you
9.
Your meeting
attendees are waiting
10.
Microsoft: Abnormal log in activity on
Microsoft account
11.
IT: ATTENTION: Security Violation
Hope you weren’t part of them! Enforce
security awareness in your company!
Labels:
Cybersecurity,
Data Privacy,
Hacker,
News,
Phishing,
Risk,
Threat
Thursday, 9 July 2020
Critical Android Vulnerabilities are Patched by Google.
Few critical remote code execution vulnerabilities
are addressed in the July update.
The most severe flaws allow attackers to execute
code with high privileges using a special file. One of them is impacting Android
8.0+ (CVE-2020-0224), another affects Android 10(CVE-2020-0225).
Another critical flaw in Android 10(CVE-2020-0107)
is an information disclosure vulnerability.
In addition to critical flaws Google is patching
bunch of high severity issues, such as privilege escalation in the framework,
issues in WLAN and Qualcomm kernel.
Wednesday, 8 July 2020
Dark Web: Over 15 million credentials from 100 000 data breaches.
According to Digital Shadows Photon Research a number of stolen user credentials increased by 300% comparing with 2018. Over 15 million account logins, including user names and passwords, were stolen from 100 000 data breaches. Approximately 5 million user credentials are unique.
Reported average price for one pair was a bit over $15, however some premium banking credentials were sold for much more. Anti-virus and security related credentials were sold for around $22. The most valuable pairs were admin's credentials which give cybercriminals access to the whole network. The full report can be found and analyzed.
Labels:
Breach,
Cybersecurity,
Data,
Data Privacy,
Hacker,
News,
Privacy,
Risk
Subscribe to:
Posts (Atom)