Greetings <<First Name>>! This newsletter brings to your inbox every Friday:
🗞️ this week's most important cyber security news, 📅 next week's upcoming webinar trainings and 🛡️ most recent Cyberday development.
HK based popular YouTube channel used as a means for distributing malicious Tor-version. Browser's own website is blocked in China.
⚠️ #Malware campaigns using hacked channels and video description links are getting more and more popular.
Article has interesting "warning examples" for sensitive data exposure, incl.:
📣 LinkedIn career updates
🖨️ discarded office printers
🖼️ social media pics
📧 emails sent to personal accounts
👓 even eyeglass reflections
#cybersecurity
⚠️ Browser-in-the-browser is a novel #phishing tactic that should be on security radars.
An authentic-looking fake browser window (e.g. a login form) is deployed to steal credentials and take over accounts.
Steam users are now targeted >>
Former Uber CSO and DoJ #cybercrime prosecutor guilty of hiding Uber data theft.
In 2016 crooks stole 57M customer records from Uber systems. Crooks were paid a ransom to cover up the incident, though law requires disclosing breaches.
☢️ North Korean hacking group spotted exploiting Dell driver CVE in its spear #phishing attacks.
Attack disguises as a "job offer" to spy and steal data from carefully selected targets (e.g. aerospace experts, political journalists).
We are building a readiness assessment view that would serve e.g. the following uses: At the beginning of Cyberday use, the core team can assess organization's readiness...