Thu. May 19th, 2022

Russia continues as such To push Ukraine to the brink of invasion, IT administrators and researchers in the troubled country have discovered destructive data to remove pose malware as ransomware and Hidden a number of Ukrainian networks. The situation has provoked a devastating Russian malware campaign against Ukraine in the past – including the infamous NotPetya attack in 2017.

Elsewhere on the continent, the Austrian data regulator Recently finished Use of Google Analytics violates EU GDPR privacy rules. The decision could set the tone for other countries and other analytics services and send waves across the cloud.

A pair of zoom vulnerabilities, now patched, can expose the ubiquitous video conferencing service and its users Zero-click, or non-interactive, malware attack. And a flaw in iOS 15 that Apple has known since November Publish users’ web browsing Activity On the other hand, though, Apple’s new iCloud private relay feature, which can protect your browsing activity from being dazzled, Is in beta and you can try it now.

And there are more. Every week we collect all the security news that Wired has not covered deeply. Click the title to read the full story.

The giant international cryptocurrency exchange finally confirmed this week that a hacker had stolen cryptocurrencies worth $ 30 million from the digital wallets of 483 users. The agency initially described the situation as “an incident” and said “no customer’s funds were wasted.” The hackers stole 4,836.26 ETH, about $ 13 million, 443.93 BTC, about $ 16 million, and other currencies worth about $ 66,200. The exchange said that in most cases it “prevented unauthorized withdrawals” and added that in other cases it paid customers for their losses. says it has implemented additional security protections and called on third-party auditors to further evaluate its security. The company did not provide specific details about the improvement.

Israeli business and technology news site Calculist released an investigation this week alleging that Israeli law enforcement used the NSO group’s Pegasus spyware to monitor citizens, including former Israeli Prime Minister Benjamin Netanyahu, former government employees and prominent members of the protest movement against mayors. Police have widely denied the report, but on Thursday, Israeli Attorney General Avichai Mandelblit told the police chief that he was beginning an investigation into the claims. “It is difficult to exaggerate the extent of the alleged violation of fundamental rights,” Mandelblit wrote to Kobe Shabtai, Israel’s police commissioner, if the calculist’s decision proves to be true.

Interpol announced this week that Nigerian law enforcement had arrested 11 suspected business email app scammers in mid-December. Some are members of the infamous Silver Terrier BEC Group. BEC is an influential type of online scam where attackers use fake email accounts, fake personalities and phishing scams to trick businesses into sending money to the wrong place. Often this compromises an email account within a target organization to justify a trick. Interpol said this week that after evaluating the devices of 11 suspects, it linked them to a scandal that targeted more than 50,000 targets. One suspect complained of possessing more than 800,000 potential victim website certificates alone, Interpol said, while having access inside 16 companies that were actively sending money to Silver Terrier-linked accounts.

President Joseph Biden signed a memorandum this week extending the National Security Agency’s responsibility to protect US government computer networks. The directive specifically focuses on sensitive federal IT infrastructure between the Department of Defense, intelligence agencies and their contractors. This measure binds the best practices of security, such as the implementation of encryption, support for two-factor authentication, the addition of network detection capabilities, and the use of other cloud defense systems. The memo basically synchronizes the requirements of national security agencies with an executive order from May that sets security standards for civilian agencies.

More great cable story

Source link

By admin

Leave a Reply

Your email address will not be published.