Greetings <<First Name>>! This newsletter brings to your inbox every Friday:
🗞️ this week's most important cyber security news, 📅 next week's upcoming webinar trainings and 🛡️ most recent Cyberday development.
Back in 2017, Industroyer was the first #malware targeted for hitting power grids.
⚠️ In 04/22 Rus attacked grids in UKR. Attack was luckily thwarted, but critical infrastructure is becoming more and more frequent target for cyber attacks.
Researchers warn a post-COVID upsurge in travel has painted a bullseye on the industry and has spurred #cybercrime's.
Rising:
✈️ Theft of airline reward points
🔐 Account takeover for travel websites
🗄️ Travel-related database breaches
⚠️ New interesting #vulnerability in modern Intel/AMD processors can let attackers steal e.g. encryption keys via timing-based side channels.
Intel recommends cryptographic devs to harden apps against frequency throttling info disclosure.
🎣 One #phishing scam stole 1M FB credentials in 4 months - and counting.
Scam included familiar elements:
🔗 short msg with a link
↩️ chain of redirects to dodge security
🔐 fake FB login
🤖 automated distribution to victim's friends
#Ransomware groups have started regularly threatening to publish stolen victim data on dark web.
⚠️ Latest cunning innovation to get victims concerned is publishing on public internet, with all data available in an easily searchable form.
You will now see additional information above each guidelines list about when the next notification of reading the guidelines will be sent to employees by default....
You can now enable the "Risk autopilot" from your account's risk management settings.This is our newest addition for making cyber security risk management more automated...