Remove Computer and Electronics Remove Government Remove IT Remove Phishing
article thumbnail

Russia-linked APT28 used new malware in a recent phishing campaign

Security Affairs

Ukraine’s CERT (CERT-UA) warned of a new phishing campaign by the APT28 group to deploy previously undocumented malware strains. The Computer Emergency Response Team of Ukraine (CERT-UA) warned of a new cyber espionage campaign carried out by the Russia-linked group APT28 (aka “ Forest Blizzard ”, “ Fancybear ” or “ Strontium ”).

Phishing 123
article thumbnail

The City of Durham shut down its network after Ryuk Ransomware attack

Security Affairs

According to the local media, the City of Durham was hit with a phishing attack aimed at delivering the Ryuk Ransomware on the victims’ systems. Once it’s inside, Ryuk can spread across network servers through file shares to individual computers,” reads a post published by SBI. 911 calls, though, are being answered.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware attack disrupted store operations in the Netherlands and Germany

Security Affairs

Electronics retail giant MediaMarkt was hit by a ransomware attack that disrupted store operations in the Netherlands and Germany. Media Markt is a German multinational chain of stores selling consumer electronics with over 1000 stores in Europe. The stores will remain open, but can only sell products that are physically in the store.

article thumbnail

Croatia government agencies targeted with news SilentTrinity malware

Security Affairs

Croatia government agencies have been targeted by unknown hackers with a new piece of malware tracked as SilentTrinity. A mysterious group of hackers carried out a series of cyber attacks against Croatian government agencies, infecting employees with a new piece of malware tracked as SilentTrinity. ” reads one of the alerts.

article thumbnail

Information Security vs Cyber Security: The Difference

IT Governance

You’re most likely to access data on your work computer or via paper records, but information can be found in many places. The second sub-category of information security relates to the protection electronic information. Cyber security is a particular type of information security that focuses on the protection of electronic data.

article thumbnail

What is data loss and how does it work?

IT Governance

Unlike desktop computers, laptops don’t have extra covers to protect them from water damage, which increases your risk of electronic components short circuiting. Computer viruses. Attacks often begin with an infected attachment in a phishing email. A computer’s hard drive is its most fragile part.

IT 98
article thumbnail

Foreign hackers breached Russian federal agencies, said FSB

Security Affairs

FSB National Coordination Center for Computer Incidents (NKTsKI) revealed that foreign hackers have breached networks of Russian federal agencies. Attackers gained access to mail servers, electronic document management servers, file servers, and workstations of various levels to steal data of interest. ” reads the report.