Cyber News from the Past Week
CyberSafe - Information & Cyber Security Services
Information & Cyber Security Services - Protecting your Data and Reputation - Penetration Testing, SOC Managed Services
Cyber News from the Past Week
1. Attackers from North Korea attacked Israel and distributed a malicious version of a product used for call centers (3CX), which raises concerns about introducing spyware to subcontractors.
?
2. The government of Costa Rica is suffering from an extensive attack carried out by the attack group CONTI, the White House transfers to the government an amount of 25 million dollars for the purpose of establishing a SOC system.
?
3. The DISH company in the United States was attacked, the attack caused a loss of investors to the company. Several class actions have been filed against the company on behalf of its customers.
OPISRAEL ATTACK:
We remind you that in recent years on this date 07/04, groups hostile to Israel tried to attack and vandalize Israeli websites, both government and private.
?
What is the OPISRAEL attack:
In recent years, cyber attacks on Israeli entities have become a tradition. The attacks are carried out by many hacker organizations hostile to Israel.
These attacks are carried out on April 7 and in which the attackers try to bring down or corrupt government and private websites.
领英推荐
Cyber attacks are carried out using several vectors:
Penetration of databases, publication and malicious use of information, and exploitation of security weaknesses in websites in order to penetrate databases containing sensitive information such as: username, password, email addresses, residential address, credit card information and more.
SMS messages and phone scams designed to panic the public.
Website defacement - changing the home page of a certain website whose security level is low. Instead of a proper home page, hateful sentences, political slogans, or any other message the hacker wants to convey will appear.
In order to reduce the risk it is recommended:
?
1. You should make sure that the information security policy in your organization is updated and that the Group Policy is configured correctly.
2. The information security procedures among the organization's employees must be refreshed.
3. Be alert for suspicious email/SMS messages and if you come across any, please inform the security/network manager in the organization.
4. The end equipment operating systems and third party software in the organization must be updated.
5. An emergency plan must be defined in case of cyber attacks. The program must contain an emergency team whose job it is to respond during cyber incidents to incoming attacks and, when necessary, know how to activate third-party agents.
6. Vigilance regarding OVERLOAD attempts on the Firewall. In this way, an address or geographic location can be blocked in a targeted manner.
7. It is recommended to implement a cloud-based solution that emphasizes DDOS attack detection on this solution to provide quick detection of the incoming traffic and ease the load.
8. It is recommended to implement a security solution for web applications using a Web Application Firewall. This solution provides protection against layer 7 attacks, which may lead to the theft of information from websites.