Tag Archive for: guide

Russian Agents Hack Webcams to Guide Missile Attacks on Kyiv


The Security Service of Ukraine (SSU) has asked owners and operators of webcams in the country to stop broadcasts from their devices over concerns about Russia’s intelligence services using the feeds to conduct military reconnaissance against strategic targets.

The SSU’s move follows a recent incident where Russian agents hacked into two residential webcams in Kyiv to gather information on the city’s air defense systems prior to launching a missile attack on the Ukrainian capital.

Residential Webcams

In a statement, the SSU described one of the webcams as being located on top of a Kyiv apartment building — apparently near a critical infrastructure facility — and being used by the condo association to monitor the surrounding area. Russian intelligence services hacked into the camera, changed its viewing angle, and streamed its live feed to YouTube from which they monitored everything within the camera’s range.

The second camera too was located at a residential complex in Kyiv, this one for monitoring the building’s parking facility. Russian agents took control of the webcam the same way they did with the first and used it to gather information on an adjacent critical infrastructure facility. “The aggressor used these cameras to collect data to prepare and adjust strikes on Kyiv,” the SSU said. “Based on the uncovered facts, the SSU is acting to neutralize new attempts by the invaders to conduct reconnaissance and sabotage through online cameras.”

So far, this has meant blocking the operation of some 10,000 IP cameras in Ukraine that Russia could have used to inform its missile attacks on the country, the SSU said. In its statement, the state security agency reminded citizens and operators of street webcams in the country about their obligation not to broadcast video and images that Russia could use for targeted attacks. “Remember: it is forbidden to film and publish photos and videos of the operation of the Defence Forces and the consequences of enemy attacks,” the SSU said. “The publication of such material on the Internet is considered to be adjustment of enemy fire and is subject to criminal liability.”

The Broader Threat

Russia’s hacking of IP cameras and the country’s use of…

Source…

Guide To Freeing Yourself From The Dangers Of Ransomware


(MENAFN– Costa Rica News) –a-

News headlines in recent months have made it clear that ransomware is not just another urban horror story, as it has become the most frightening threat to companies in Latin America.
Kaspersky figures reveal that ransomware gangs are stalking their victims to deliver a devastating blow: between July 2022 and July 2023, the company blocked 1.15 million attempted ransomware attacks in the region, equivalent to 2 blocks per minute.

For the most part, these types of attacks follow a fairly common methodology: an employee takes the bait of social engineering tactics and opens a malicious email attachment.
Or, attackers gain access to a company’s systems by obtaining their credentials and passwords through leaks, using brute force techniques, or purchasing this initial access data on the Dark Web.
Another attack vector that cybercriminals commonly take advantage of are vulnerabilities in programs or apps since, if they are not patched, they allow them to infiltrate a corporate network.

Unfortunately, this nightmare materializes daily, leaving new victims in public and private institutions, regardless of their industry or size.
The attacks are increasingly terrifying because they no longer only consist of hijacking companies’ equipment and infrastructure, thus paralyzing their operations, but also of stealing customer and employee data, intellectual property, and confidential information and then extorting them for a ransom for their money. release and/or prevent its publication.

So that companies do not fall asleep in the face of this threat, Kaspersky has compiled guides so that both SMEs and large companies can get rid of this nightmare.

Know what the possible failures are in your systems, network and structure

You can perform an internal audit or evaluate external security diagnostic services, such as phishing simulations or digital risk reports on the attack vectors associated with an organization’s entire digital footprint.

Assess your employees’ knowledge

Ensure that the security team has the information necessary to evaluate defenses against ransomware and can plan incident response actions that prevent an…

Source…

Choosing the Perfect Internet Security Suite for Windows 11: A Comprehensive Guide


Welcome to our comprehensive guide on choosing the perfect internet security suite for Windows 11! In an increasingly digital world, protecting your computer and personal information has become more crucial than ever. As hackers and cyber threats continue to evolve, it’s essential to equip yourself with a robust defense system that safeguards against viruses, malware, phishing attacks, and more. In this blog post, we will walk you through the crucial aspects to consider when selecting an internet security suite tailored specifically for Windows 11. So let’s dive in and fortify your online presence like never before!

Introduction to Internet Security and Windows 11

With the increasing use of the internet for various purposes such as communication, entertainment, banking, and shopping, it has become more important than ever to ensure the security of our devices and personal information. Windows 11, the latest operating system from Microsoft, comes with enhanced security features to protect its users from cyber threats. However, relying solely on these built-in features may not be enough. This is where internet security suites come into play.

In this section, we will discuss the basics of internet security and how it relates to Windows 11. We will also explore some of the key factors to consider when choosing an internet security suite for your device running on Windows 11.

Understanding Internet Security

Internet security refers to the measures taken to protect computers or networks from unauthorized access and attacks that can compromise or steal sensitive information. This includes protecting against viruses, malware, spyware, phishing scams, and other types of cyber threats.

Windows 11 offers built-in features such as a firewall, anti-malware protection through Microsoft Defender Antivirus (formerly known as Windows Defender), and secure boot technology to safeguard against external attacks. However, these features may not be enough to provide…

Source…

New revised guide to operational technology (OT) security published


NIST Publishes Guide to Operational Technology (OT) Security | NIST
Credit: Smart Connected Systems Division, NIST

The impact of cybersecurity breaches on infrastructure control system owners/operators is more significant and visible than ever before. Whether you work for an infrastructure owner/operator or are a consumer of an infrastructure service, the events of the past few months/years have made it clear that cybersecurity is a critical factor in ensuring the safe and reliable delivery of goods and services. For infrastructure control system owners/operators, it can be challenging to address the range of cybersecurity threats, vulnerabilities, and risks that can negatively impact their operations, especially with limited resources.

Operational Technology (OT) encompasses a broad range of programmable systems and devices that interact with the physical environment (or manage devices that interact with the physical environment). These systems and devices detect or cause a direct change through the monitoring and/or control of devices, processes, and events. Examples include industrial control systems (ICS), building automation systems, transportation systems, physical access control systems, physical environment monitoring systems, and physical environment measurement systems. OT can be found in all critical infrastructures.

To assist OT system owners/operators, NIST has published Special Publication (SP) 800-82r3 (Revision 3), Guide to Operational Technology (OT) Security, which provides guidance on how to improve the security of OT systems while addressing their unique performance, reliability, and safety requirements. SP 800-82r3 provides an overview of OT and typical system topologies, identifies typical threats to organizational mission and business functions supported by OT, describes typical vulnerabilities in OT, and provides recommended security safeguards and countermeasures to manage the associated risks.

SP 800-82 has been downloaded more than 3 million times since its initial release in 2006, and this is the third revision of NIST SP 800-82, with…

Source…