Cyber Security News 11/04/2021

Cyber Security News, la raccolta quotidiana delle principali notizie del mondo informatico. Il servizio di Osint Cyber Search Engine:

   
TitleContentSource
Incident reported at Iran s Natanz nuclear facilityAn \"accident\" occurred in the electricity distribution network at Iran s Natanz nuclear facility on Sunday morning, Behrouz Kamalvandi, the spokesman of the Atomic Energy Organization of Iran told the Iranian Fars News Agency on Sunday.No ihttps://www.jpost.com/middle-east/incident-reported-in-iranian-natanz-nuclear-facility-664792
‘Accident’ at Iran’s Natanz nuclear facility after centrifuge activationAn “accident” occurred in the electricity distribution network at Iran’s Natanz nuclear facility on Sunday morning, Behrouz Kamalvandi, the spokesman of the Atomic Energy Organization of Iran told the Iranian Fars News Agency on Sunday. No injuries ohttps://vzonetvgh.com/accident-at-irans-natanz-nuclear-facility-after-centrifuge-activation
Talon: An Israeli Cybersecurity Company For The Post-Covid Workforce Scores Massive $26 Million Seed FundingAssociate editor at Forbes, covering cybercrime, privacy, security and surveillance.Talon, an Israeli cybersecurity startup that’s promising to solve the problems that come with the pandemic-era workforce, has raised a $26 million seed round. That’s https://www.forbes.com/sites/thomasbrewster/2021/04/11/talon-an-israeli-cybersecurity-company-for-the-post-covid-workforce-scores-massive-26-million-seed-funding
Ransomware-Infektionen bei Pierre Fabre, Moba Mobil Automation etcDer französische Kosmetikhersteller Pierre Fabre, die deutsche Moba Mobil Automation sind wohl Opfer von Ransomware-Infektionen geworden. Hier ein kurzer Überblick über die Fälle. Zudem gibt es einige neue Angriffsmethoden, wie Malware, die per Kontahttps://www.borncity.com/blog/2021/04/11/ransomware-infektionen-bei-pierre-fabre-moba-mobil-automation-etc
Cyberwar: senza le regole del \"gioco\", è lecito porsi domandeNella guerra convenzionale, è accettato che se uno stato si trova sotto attacco, ha il diritto di rispondere con la forza. Ma è meno chiaro come i paesi dovrebbero regolarsi negli attacchi informatici: hack sostenuti dallo stato che spesso hanno perihttps://www.redhotcyber.com/post/cyberwar-senza-le-regole-del-gioco-%C3%A8-lecito-porsi-domande
Mobile-based banking now threatened by sophisticated malware | #malware | #ransomware | #hacking - National Cyber Security News TodayNew Delhi: Cybercriminals are now using new and advanced techniques to attack mobile-based banking and the geography of attacks has become more diversified and extensive — especially from a mobile financial malware perspective, a new report said on Shttps://nationalcybersecuritynews.today/mobile-based-banking-now-threatened-by-sophisticated-malware-malware-ransomware-hacking
Story of a hack on Instagram and ransom in bitcoin - The CryptonomistLast weekend, the CMO and social media manager of The Cryptonomist, Ilaria Stirpe, was the victim of a hack that took her off her Instagram profile (ilifestyleme) and received a ransom demand in bitcoin.  We are sharing this story because we hope it https://en.cryptonomist.ch/2021/04/11/hack-instagram-ransom-bitcoin
Lazarus groep: wie zijn ‘s werelds bekendste crypto hackersZeggen de namen John Dillinger, Lester M. Gillis, a.k.a “Baby Face” Nelson, Bonnie Parker, Clyde Barrow en Stanley Mark Rifkin je iets? Nee, niet echt of misschien? De eerste vier zijn beruchte bankovervallers in Amerika tijdens de Amerikaanse Great https://allesovercrypto.nl/blog/lazarus-groep-wie-zijn-s-werelds-bekendste-crypto-hackers
What is Privileged Access Security? PAS for Business SuccessWhen considering cybersecurity, it is a universal truth that unfettered privileged access to systems will result in data breaches and ransomware attacks. Traditional approaches of building bigger and bigger defences by adding yet more tools into the https://emtmeta.com/what-is-privileged-access-security
Victim Says Do the Right Thing | #malware | #ransomware | #hacking - National Cyber Security News TodayIf your organization, despite its best cybersecurity efforts, suffered a ransomware outbreak today, would it be well prepared to “do the right thing” with its response? The Scottish Environment Protection Agency has provided a good example, issuing chttps://nationalcybersecuritynews.today/victim-says-do-the-right-thing-malware-ransomware-hacking
E Hacking News - Latest Hacker News and IT Security News: Maze/Egregor Ransomware Earned over $75 MillionResearchers at Analyst1 have noticed that the Maze/Egregor ransomware cartel has made at least $75 million in ransom payments to date. This figure is the base of their estimations, as the maximum could be conceivably more since not every victim has dhttps://www.ehackingnews.com/2021/04/mazeegregor-ransomware-earned-over-75.html?m=1
Cyber threats against industrial control systems began rising in H2 2020: Report | #malware | #ransomware | #hacking - National Cyber Security News TodayCyber threats against industrial control systems are on the rise, according to a report by cybersecurity firm Kaspersky. As per the report, while the percentage of ICS computers on which malicious objects were blocked had declined since the second hahttps://nationalcybersecuritynews.today/cyber-threats-against-industrial-control-systems-began-rising-in-h2-2020-report-malware-ransomware-hacking
Crypto Crime Takes on New Form in Recent Italy Harassment Case - The Bitcoin Street JournalCrypto Crime Takes on New Form in Recent Italy Harassment Case Crypto crime is no laughing matter and as we have seen in the past, it can take on many forms. It does not always come in the shape of a cyberattack or a hack on an exchange. Rather, somehttps://thebitcoinstreetjournal.com/crypto-crime-takes-on-new-form-in-recent-italy-harassment-case-2
How to Avoid the Most Common Form of Cyberattack | by Daniel van Driel | MediumThe One Foolproof Method to Spotting Phishing Attacks: Understanding URLs/LinksPhoto by Colman Byrne on UnsplashSaudi Journalist and Dissident Jamal Khashoggi, Chairman of Hilary Clinton’s 2016 presidential campaign John Podesta and the Ukrainian powhttps://danielvandriel.medium.com/how-to-avoid-the-most-common-form-of-cyberattack-aedd4862bc25?source=rss------cybersecurity-5
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85) - Bitcoins ChannelRansomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85) Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85) Ransomware Revolution: The Rise of a Prodigious Cyhttps://thebitcoinstreetjournal.com/ransomware-revolution-the-rise-of-a-prodigious-cyber-threat-advances-in-information-security-85
Indian news portal s server breach exposes 40mn users; hackers selling 700K records for $350Hackers Steal Data from Law Firm That Represented Trump The dust is yet to settle on the MobiKwik alleged data leak, another major security breach in a reputed Indian news portal has come to light. An independent security researcher has highlighted ahttps://www.ibtimes.co.in/indian-news-portals-server-breach-exposes-40mn-users-hackers-selling-700k-records-350-835112
How to stamp out ransomware? Ban insurance payments, says exGCHQ directorto HELLFIRE So 1 to 3 bitcoin payments equal secure regular back up cost procedures. Insisting/legislating secure backups should negate the need to pay. Insurance needs to help define backup procedureshttp://www.dslreports.com/forum/r33081281-How-to-stamp-out-ransomware-Ban-insurance-payments-says-exGCHQ-director#33081705
IcedID Banking Trojan Deployed Via Legitimate Contact Forms - The Cybersecurity Daily NewsIt has recently the Microsoft 365 Defender Threat Intelligence Team has detected that malicious actors are deploying the IcedID info-stealer malware via authentic corporate contact forms to trap victims in phishing campaigns. The IcedID banking Trojahttps://cyberdaily.securelayer7.net/icedid-banking-trojan-deployed-via-legitimate-contact-forms
Hackers try to extort University of Colorado in cyberattackBOULDER — Hackers are trying to extort the University of Colorado after a cyberattack that potentially compromised personal information from more than 310,000 files, including student data, medical information and several Social Security numbers, unihttps://coloradosun.com/2021/04/10/university-of-colorado-hackers
Preparing for AI-enabled cyberattacks - HelewixCyberattacks continue to grow in prevalence and sophistication. With the ability to disrupt business operations, wipe out critical data, and cause reputational damage, they pose an existential threat to businesses, critical services, and infrastructuhttp://helewix.com/howto/preparing-for-ai-enabled-cyberattacks
Expedient Delivers Multi-Cloud Cyber Security Solutions to Protect All Workloads, Applications, and Systems | #conferences2021 | #cybersecurity | #conference - National Cyber Security News TodayPITTSBURGH, April 6, 2021 /PRNewswire/ — Looking to set a new standard for how cyber security capabilities are delivered, managed and controlled across multi-cloud environments, Expedient today announced the availability of its Expedient Security CTRhttps://nationalcybersecuritynews.today/expedient-delivers-multi-cloud-cyber-security-solutions-to-protect-all-workloads-applications-and-systems-conferences2021-cybersecurity-conference
Hacker Incar Pengguna LinkedIn Lewat Lowongan Kerja PalsuKOMPAS.com - Sejak pandemi Covid-19 melanda sejumlah negara di dunia, angka pencari kerja kini jauh melampaui jumlah ketersediaan lapangan pekerjaan. Situasi ini nampaknya dianggap sebagai peluang tersendiri oleh para pelaku kejahatan siber. Misalnyahttps://tekno.kompas.com/read/2021/04/11/07070027/hacker-incar-pengguna-linkedin-lewat-lowongan-kerja-palsu
Fake ads for a non-existent version of Clubhouse spread malware to victomsPossibly because an Android version of the app is still months away, quite a few bad actors have been tricking Android users into installing malware-loaded fake versions of a non-existent Clubhouse for Android app. And now TechCrunch is reporting thahttps://www.phonearena.com/news/fake-clubhouse-ads-on-facebook-helped-spread-malware_id131355
Cring ransomware hits ICS through two-year-old bugAndrei Merkulov – stock.adobe.co A long-disclosed vulnerability in Fortinet’s Fortigate VPN servers is being exploited to distribute Cring ransomware By Alex Scroxton,Security Editor Published: 09 Apr 2021 9:20 The operators of Cring ransomware have https://url4ever.com/cring-ransomware-hits-ics-through-two-year-old-bug
Stop using your pet's name as a password dog helping owner work on PCUK consumers are putting themselves at risk of cyberattack by using weak passwords such as their pet's name. A warning from National Cyber Security Centre (NCSC) said 15% of […]http://www.greenground.it/2021/04/11/stop-using-your-pets-name-as-a-password-dog-helping-owner-work-on-pc
PCWELT Oster-Aktion 2021: Screen Recorder nur heute gratisPanagiotis Kolokythas Bis zum 11. April schenken wir Ihnen jeden Tag eine tolle Vollversion. Es lohnt sich also, hier täglich vorbeizuschauen. Vergrößern PC-WELT schenkt Ihnen in der Osterzeit jeden Tag eine neue Vollversion.© fotolia / drubig-photo https://www.pcwelt.de/news/PCWELT-Oster-Aktion-2021-Screen-Recorder-nur-heute-gratis-11009616.html
How to Avoid the Most Common Form of Cyberattackhttps://medium.com/p/aedd4862bc25?source=linkShare-a14e0cd6ee90-1618124403https://www.reddit.com/r/guides/comments/mom8kj/how_to_avoid_the_most_common_form_of_cyberattack
Scraped data of 70 Million Twitter users?
Cyber Security News 12/04/2021

Pronto intervento Cyber Swascan

Contattaci per un supporto immediato

Il sottoscritto, in qualità di interessato DICHIARA di aver letto e compreso il contenuto della privacy policy ai sensi dell’articolo 13, GDPR. ACCONSENTE al trattamento dei Dati in relazione all’invio da parte del Titolare di comunicazioni afferenti alla gestione di eventuali misure precontrattuali, preordinate alla stipulazione e/o esecuzione del contratto con il Cliente nonché all'adempimento dei relativi obblighi.
Il consenso prestato potrà essere revocato in qualsiasi momento contattando il Titolare ai recapiti presenti nella citata privacy policy.