Posts

Russia is ready to talk with EU despite political hostility – Prensa Latina


On Friday, in a telephone conversation, Russian President Vladimir Putin told his French counterpart, Emmanuel Macron, that Moscow is willing to resume negotiations with the community bloc, provided it shows a genuine interest in doing so.

Both leaders agreed on the importance of establishing constructive relations, as well as the return to normal dialogue based on trust.

They stated that the improvement of relations will facilitate the solution of problems related to computer security, the fight against international terrorism, healthcare challenges, the environment and the response to regional conflicts.

During the EU summit on June 24, the French president and German Federal Chancellor Angela Merkel proposed to establish dialogue with Russia, considering that there there are issues on which Moscow cannot be dispensed with, such as those related to Syria, Libya, continental security and climate change.

The French-German initiative to hold a meeting between the parties failed to win consensus, especially due to strong opposition from Poland, Lithuania, Latvia and Estonia.

EU foreign ministers this week approved an extension for another six months of a package of economic restrictions against Russia.

jg/iff/msm/mml

Source…

Hackers are playing by new rules, and dealerships’ defenses aren’t ready

Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being.


Auto dealers are getting better at protecting their computer networks from cyberattacks, an information technology consultant who works with dealerships told me last week.

They’re investing in phishing training, a process that tests whether employees click on suspicious emails and trains those who do on proper security practices. More are carrying cyber insurance. They’re talking to colleagues in industry peer groups about best practices.

And yet, said Erik Nachbahr, president of Helion Technologies, just as dealerships have improved their defenses against hackers, the hackers have started using a different playbook.

It used to be that cybercriminals would deploy automated programs that would lock up files once someone clicked a malicious link or attachment in an email, he said. Then antivirus software and firewalls got better at blocking them. So the hackers evolved. Now, Nachbahr says, when they gain access to the networks, they’re embedding themselves in the systems, figuring out how they’re designed and laying the foundation for an attack before they launch it.

Those attacks — often ransomware, in which hackers lock down a computer system in exchange for a ransom demand — can be devastating, he said. Last month, for instance, Colonial Pipeline, which provides crucial energy supplies to the East Coast, went down for days after an attack; the CEO has said the organization paid a $4.4 million ransom. Municipal governments and public schools also have been targets.

So have dealerships. Nachbahr told me that among Helion’s 750 U.S. franchised dealership clients, “we see credible, critical-level threats a few times a week.”

“The attackers have identified industries where they’re not doing enough defense,” he said. “And dealers are one of those.”

New threat intelligence software can better detect hackers rooting around inside computer networks, he said. But it’s newer technology, and many dealerships aren’t yet using it.

Nachbahr says bringing awareness to the severity of cyberattacks and what’s at stake for dealers — including the possibility of having their operations shut down entirely — is his top priority.

“Dealers have always struggled with readiness when it comes to…

Source…

Cyberattack Are You Ready? | Fort Worth Business Press


If you think computer security isn’t a big deal or it’s not your problem, you’re dead wrong.

  • Ransomware attacks cost businesses an estimated $300,000 per incident last year.
  • Colonial Pipeline paid hackers a $4.4 million ransom to get back online.

Can you afford to cough up thousands or millions to online blackmailers? Big or small, you’re at risk.

Join FBI Special Agent Brett Leatherman and Cybersecurity Expert Michael Moore from M3 Networks for FWBP’s webinar “Cyberattack Are You Ready.”

Learn how to keep your company safe from hackers and cyber crooks.

  • Are we facing a cybersecurity pandemic?
  • How even your business is a target.
  • How employees put your business at greater risk.
  • Can my business afford cybersecurity protection?
  • Restoring a company’s reputation following an attack.
Brett Leatherman

Brett Leatherman
Supervisory Special Agent 
Federal Bureau of Investigation

Mr. Leatherman manages a team of special agents, computer scientists, and intelligence personnel in North Texas responsible for the investigation and attribution of global national security cyber threats targeting United States interests. The FBI is the lead federal agency for investigating cyber-attacks by criminals, nation state actors, and terrorists, and the Dallas Division plays a key role in that effort.

Michael Moore
Founder and CEO
M3 Networks

Michael Moore is a solutions-focused Senior Executive, Advisor, Public Speaker, and Board Member with more than 15 years of success across the information services industry. His broad areas of expertise include network administration, account management, cloud computing, and technical support. Michael holds a leadership position as the Founder and Chief Executive Officer of M3 Networks where he oversees the company concentrating on building solutions that incorporate proactive computer maintenance, secure data protection, and responsive IT support.

Dallas FBI Field Office
https://www.fbi.gov/contact-us/field-offices/dallas

Ransomware Advisory
https://home.treasury.gov/system/files/126/ofac_ransomware_advisory_10012020_1.pdf

Internet Crime Complaint…

Source…

Phishing Will Continue Wreak Havoc in 2021—Make Sure You’re Ready

Opt-in to Cyber Safety. Multiple layers of protection for your devices, online privacy and more.


The number one cause of a cybersecurity breach is phishing, and this year the average cost of a corporate breach was $2.8 million, making phishing big business.

Yet, many organizations do not see phishing as their biggest concern and do not use the latest technology to defend themselves against 2.0 phishing attacks.

In July, SlashNext Threat Labs reported a 30% increase over 2019 as phishing threats grow to over 25,000 a day. However, as the year comes to a close, that number grew to 35,000/day by early December and now is well above 50,000/day.

Phishing attacks are growing because they are no longer just an email problem. The problem has expanded to SMS/iMessage, social networks, collaboration platforms, videoconferencing, and gaming services. Cybercriminals use fake login scams, scareware tactics, fraudulent ads, and rogue software downloads as attack payloads.

Mobile users are particularly vulnerable because of small screens, users’ mistakes, and invisible URL strings hiding the address. With iPhone, users are 18x more likely to get phished than to download malware. The stakes are high for mobile and endpoint security vendors to make sure they detect and block these zero-hour attacks. Still, these fast-moving threats are taking days to appear in threat detection engines, leaving the cybercriminals an eternity to wreak havoc on remote workers.

SlashNext uses virtual browsers and machine learning to identify over 40,000 unique phishing URLs a day with patented technology that identifies zero-hour phishing threats, hours and sometimes days ahead of the leading threat detection engines. SlashNext tested several malicious URLs to see if VirusTotal or other threat feeds discovered and blocked those attacks, as demonstrated in this blog post. Of the URLs that we found, VirusTotal and many other engines still reported them clean four days later, despite the fact they were still active. Learn how SlashNext stays ahead of the competition in this video.

Protecting remote workers from today’s sophisticated attacks requires a phishing protection toolbox that takes a Zero-Trust approach covering several attack vectors and goes beyond URL inspection and domain reputation.

 

Harness the…

Source…