International Work Knows Notorious REvil Ransomware Group Offline


a perpetual drum of the highest ransomware threats continued this week, but Google’s Threat Analysis Group has also been aware of the “pass-the-cookie” threats that swindlers have used in recent years. stealing popular methods on YouTube. Although the attack was not new, Google has actively participated in solving this problem. YouTube’s fraudulent methods have been used to spread cryptocurrency fraud and to spread other falsehoods.

Meanwhile, the International Organization for Standardization released its first guidelines for the manufacture of sex dolls last week in a major phase of setting minimum safety standards for all companies. Registered with ISO 3533 or “Sex Toys: Requirements for the Production and Protection of Genitalia, Anus, or All Substances,” the document, although necessary, does not set out clear guidelines for digital security or privacy, both areas where sexual toys already exist great and great stumbling blocks.

If you are thinking about account security and want a simple weekly program to help fix things, review what you have consistency in two things has helped everywhere is provided. And if you want to move between legitimate apps, say from Google Authenticator to Twilio Authy, we have lead to do it easily without losing any opportunities.

But wait, there is more. Each week we report all WIRED security issues that are not detailed. Click on the headlines to read all the articles, and stay safe out there.

The well-known Russian-based ransomware group REvil, which launched it JBS Meat Attack in June and Kaseya oversaw software compromise in July, they too were robbed and beaten out by a group of state law enforcement agencies. The FBI, the U.S. Cyber ​​Command, and the Secret Service worked with allies in other governments to undermine REvil’s infrastructure. Following the Kaseya crackdown and the rescue operation in July, the FBI was able to capture the suspect from the Revil itself. But officials denied the weapon and did not disclose their access to REvil’s weapons. After some of the terrorist platforms were removed from the internet in July, members reinstated them in custody in September, and inadvertently resumed legal action in doing so, opening the door. The REvil page and the “Happy Blog” data release platform are now unavailable.

The second-largest director of U.S. television, Sinclair Broadcast Group, was hit by a redundancy earlier this week that affected the company’s operations and broadcasts. The evil cover weapon used in the attack is similar to those used in the past and Russia’s Evil Corp.. Crime crimes are known to be a thing of the past. Sinclair struggled to keep up the pressure throughout the week, and co-workers also reported disruptions as stations struggled to keep up with their broadcasts. “We look forward to continuing to work with a third-party security company, other prosecutors, legal staff, and government agencies as part of our research and response to this,” Sinclair said in a statement on Thursday.

It appears that a thief broke into the Argentine Registro Nacional de las Personas and stole information about all Argentines. The area is now secretly circulating to sell in gangs. The crackdown took place last month and prompted state IT networks to find a storage facility, also known as RENAPER. The agency issues national certificates, and some government agencies can apply for the grant. Officials said in a words that the attackers have a legitimate account of the users to enter the barn instead of sneaking by using the threat. The first signs of the breach came in early October when a newly created Twitter account posted photos and other personal information of 44 Argentine celebrities, including President Alberto Fernández and football players Lionel Messi and Sergio Aguero.

On Thursday, the Federal Trade Commission summoned major US internet service providers for their anonymous services and lack of privacy and security. The study focused on AT&T Mobility, Cellco Partnership (Verizon Wireless), Charter Communications Operating, Comcast (Xfinity), T-Mobile US, and Google Fiber. ISPs do not disclose their privacy practices, the FTC has found, and do not fully disclose how they use customer data. The study also showed that these services make it harder for their customers to stop collecting data.

Stories have been well-known for many years, but efforts by government and non-governmental organizations to address the problem have not been successful. “While consumers expect ISPs to take over most of the web sites they visit as part of online services, they may be surprised by the amount of data that is collected and incorporated into non-compliant services and provide the services they want,” the FTC wrote in a report. email content and search, information from connected devices, location information, and ethnicity. “


Many Great Stories



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *