Cyber security news for all


    Cyber criminals target email attachments in 2020

    The attack comes through a trustworthy looking email that appears to be part of a dialogue that is taking place. An employee opens the attachment and the employer gets caught by the blackmailer. This is happening to more and more companies and public institutions. You will then either have to completely redesign your IT or pay a ransom.

    The Fake Emails

    The fake email becomes criminals favorite tool to directly defraud companies or prepare for major cyberattacks. This is shown by the loss statistics. BEC stands for Business E-Mail Compromise or fraudulent business e-mail, often the term phishing e-mail is also used. Statistics for 2020 are not yet available, but the trend continues

    On the one hand, emails are used to inject malicious programs such as Emotet. In many cases, criminals take a different path. They are often sent to people who are responsible for transferring payments. The cyber criminals pretend to be a manager of a company or a supplier and require remittances, tax documents and other sensitive data.

    Companies Should Train Employees To Backup Copies Of Their Data

    Today, many attackers are preparing for the action, collecting information about the company and carefully selecting the target persons. They also know what they’re looking for. The damage can be significant even with minor attacks. The company is well positioned and quickly discovered for the damage. Now they want to make sure that they really cleaned everything and use specialists to do it. Specialists expect the number of cyber damages in the industrial segment to continue to increase. Ransom and extortion attacks are becoming more targeted, the attackers are better, and the sums paid are higher. A backup copy is no longer enough; today there should be several backups created and stored independently of one another.

    Recent Articles

    Hungarian banks were the target of a massive DDoS attack

    Several banks and the Hungarian Telekom have been the target of a cyber attack. The attacks are said to have come in several waves...

    The source code of Windows XP is leaked

    The source code of Windows XP is currently freely accessible. The media says that data first appeared on 4chan and is currently being exchanged...

    Hackers send malicious Azure Cloud apps to Microsoft

    Microsoft has banned some Azure Cloud applications from its cloud that the company identified as part of an attack infrastructure. Microsoft describes the approach...

    Vodafone experiences a vulnerability with fatal effects

    The injected JavaScript can access the session cookies from Vodafone website and send them to a server. An attacker can take over the session...

    Maze leaks data on its own platform

    The Maze ransomware has been up to almost a year and a half. This week, security experts warned about the actions of the cyber...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox