Subbu On Cyber, Privacy and Compliance
Subbu On Cyber, Privacy and Compliance
  • 220
  • 25 465
ISSS Cyber news 06112024
A 35-year-old woman from the Hyderabad city became the latest victim of cyber fraud and ended up losing over Rs. 1 lakh to cyber fraudsters who posing as bank executives, cheated her on pretext of updating her personal details.
The victim received a WhatsApp call from the unidentified scammers, who claimed that she needed to update her bank account details or her transactions could be stopped.
According to the cybercrime police, when the victim was reluctant, the fraudster put her in fear that if the details were not updated, Rs.5,000 would be deducted from her bank account as penalty.
“The fraudster asked her to open her mobile banking account promising to guide her through the process. As soon as she did, the fraudster gained access to her e-mail ID and other details,” said a cybercrime official.
Realising it was a fraudulent call, the victim immediately contacted the bank authorities and raised a complaint. Despite her prompt actions, Rs. 1,08,990 had been deducted from her credit card. Based on her complaint, the cybercrime police booked a case and are investigating.
In case of a cybercrime fraud, Dial - 1930 or visit www. cybercrime.gov.in. In case of any emergency of cyber frauds, call or WhatsApp on 8712665171.
The National Informatics Centre (NIC) has warned government officials against trusting the caller ID information without verification and divulging sensitive information. In the advisory, the cyber security body said cyber criminals may impersonate trusted entities to launch a "vishing" attack.
"Attackers may impersonate trusted entities, such as senior government officials, law enforcement agencies, or technical support personnel," the advisory issued recently by the National Informatics Centre (NIC) said.
The severity of the communication has been categorised as "high".
The body said the attackers can manipulate the caller ID information to create the impression that the phone call was coming from a legitimate number.
In the advisory, the body said there had been an increase in the number of vishing attacks against government officials. These attacks have been used to acquire confidential information and gain unauthorised access to official systems".
The Cyber Security Council and Immersive Labs, the leader in people-centric cyber resilience, has announced the successful completion of their recent Dubai Cyber Drill that reinforced UAE enterprises' cybersecurity posture against Critical National Infrastructure (CNI) threats.
The event included attendees from 25 major organisations representing various sectors - from financial services and telecommunications to healthcare and government - and closed with an awards ceremony.
A cybersecurity expert said that there is a new threat emerging with QR codes that carry ransomware and other viruses.
One of the malicious attack vectors now is people will go into restaurants or see display windows and other posters where it says scan this QR code, and they’ll basically replace it with a QR code that if you actually click on the link, it will download a malware for you.”
Переглядів: 28

Відео

Cyber Insurance
Переглядів 482 години тому
Cyber insurance is a type of insurance policy that helps protect organizations from financial losses and liabilities resulting from cyber attacks and data breaches. Here are the key points about cyber insurance: What Cyber Insurance Covers Cyber insurance typically covers: - Data breach costs (notification, credit monitoring, etc.) - Business interruption losses - Cyber extortion/ransomware pay...
ISSS Cyber News 04112024
Переглядів 327 годин тому
Dynamic CVV Two Bengaluru Residents Lose Rs 95 Lakh to Cyber Fraudsters. Deep fake - Narayana Murthy and Mukesh Ambani Councils in the U.K. have been affected by a string of (DDoS) attacks. The pro-Russian hacker group NoName057(16) has taken responsibility for some of the attacks. Middlesbrough Council blamed “foreign hackers” for bringing down its website twice in one week. The attacks began ...
ISSS Cyber News 01112024
Переглядів 2614 годин тому
DPDPA is all set to hit the Indian companies and to be announced as a law before 20th November Microsoft Warns of Chinese Botnet Exploiting Router Flaws for Credential Theft using password spray attack. The botnet malware has been observed targeting several brands of SOHO routers and VPN appliances, including TP-Link, Zyxel, Asus, Axentra, D-Link, and NETGEAR. A large-scale malicious operation ...
ISSS Cyber News 29102024
Переглядів 2921 годину тому
Jio Hotstar Domain Controversy Explained: Full Story Behind The Domain Dispute; Meet Jainam & Jivika The JioHotstar.com domain controversy has taken a surprising turn as it appears that the domain, originally secured by an anonymous app developer in Delhi, has now been sold to two siblings in Dubai. The drama began when the domain, seen as a prime candidate for the newly merged JioCinema and Ho...
Quick Bites nmap
Переглядів 45День тому
Nmap, short for Network Mapper, is a powerful open-source tool designed for network exploration and security auditing. Developed by Gordon Lyon (also known as Fyodor), Nmap allows users to discover hosts and services on a computer network by sending packets and analyzing the responses. Its initial release was in September 1997, and it has since evolved into one of the most widely used network s...
ISSS Cyber News 28102024
Переглядів 19День тому
At least 10 major hotels in Uttar Pradesh's Lucknow, mostly premium properties, received bomb threats via emails on Sunday. The email threatened that the explosion would take place if the ransom demand of $55,000 (Rs 4,624,288) is not met. "Bombs are hidden in black bags on the grounds of your hotel. I want $55,000, or I will detonate the explosives and blood will spread everywhere. Any attempt...
Third Party Security
Переглядів 53День тому
Understanding Third-Party Security Third-party security refers to the measures and protocols implemented to protect an organization from risks associated with external vendors, suppliers, or service providers that have access to sensitive data and systems. These third parties can include cloud service providers, payroll processors, and various contractors. While engaging with these entities can...
ISSS Cyber news 27102024
Переглядів 71День тому
UnitedHealth has confirmed for the first time that over 100 million people had their personal information and healthcare data stolen in the Change Healthcare ransomware attack, marking this as the largest healthcare data breach in recent years. Health insurance information Health information Billing, claims and payment information Other personal information such as Social Security numbers, driv...
Argus Recon toolkit
Переглядів 174День тому
Argus is a comprehensive information gathering toolkit developed by Jasonxtn, designed to facilitate reconnaissance and network exploration. Here’s a detailed overview of its features, installation process, and usage. Overview of Argus Toolkit Argus is a Python-based toolkit that streamlines the process of information gathering and reconnaissance. It is tailored for users conducting research or...
Cyber news 25102024
Переглядів 34День тому
Cyber Slavery Crisis: A report reveals that over 29,000 Indian nationals have gone missing in Southeast Asia since January 2022, many believed to be victims of cyber slavery rings. These criminal networks lure individuals with false job offers and force them into cybercrime operations, resulting in severe economic and personal consequences
DDoS and Cyber news
Переглядів 4214 днів тому
A Distributed Denial-of-Service (DDoS) attack is a malicious attempt to disrupt the normal functioning of a targeted server, service, or network by overwhelming it with a flood of internet traffic. This type of attack is executed using multiple compromised computer systems, often referred to as a botnet, which can include various devices such as computers and Internet of Things (IoT) devices13....
Sextortion and First AI Case
Переглядів 4814 днів тому
Sextortion is a form of sexual exploitation that involves coercion through the threat of releasing private sexual material. This crime can occur in various contexts, affecting both adults and children, and often utilizes digital platforms for its execution. Definition and Mechanisms Sextortion combines elements of sex and extortion, where perpetrators use non-physical coercion to demand sexual ...
Collusion Attack Quishing Mobile attack- Cyber news 23102024
Переглядів 5714 днів тому
Collusion Attacks in Social Engineering Collusion attacks in social engineering involve multiple attackers working together to manipulate individuals or systems, enhancing the effectiveness of their schemes. Mechanisms of Collusion in Social Engineering 1. Information Sharing: - Attackers pool their knowledge about a target organization or individual, allowing them to craft more convincing narr...
Cyber Blitzkriegs and Cyber news 22102024
Переглядів 2314 днів тому
Cyber Blitzkrieg refers to a strategic concept in cyber warfare that draws parallels to the traditional military tactic of blitzkrieg, or "lightning war." This term is used to describe rapid, overwhelming cyber attacks aimed at incapacitating an adversary's digital infrastructure with speed and surprise. Key Characteristics of Cyber Blitzkrieg Speed and Surprise: Just like the original blitzkri...
Data Sanctity
Переглядів 5214 днів тому
Data Sanctity
5 things to take care for BCP
Переглядів 41Місяць тому
5 things to take care for BCP
Subbu Teaches CISSP Civil Law vs Criminal Law
Переглядів 732 місяці тому
Subbu Teaches CISSP Civil Law vs Criminal Law
Webinar on MFT and DLP
Переглядів 452 місяці тому
Webinar on MFT and DLP
Subbu Teaches CISSP Common law vs Civil Law
Переглядів 372 місяці тому
Subbu Teaches CISSP Common law vs Civil Law
Subbu Teaches CISSP Evidence Qualities
Переглядів 262 місяці тому
Subbu Teaches CISSP Evidence Qualities
Subbu Teaches CISSP Evidence Types
Переглядів 532 місяці тому
Subbu Teaches CISSP Evidence Types
Credit Card Application Fraud
Переглядів 282 місяці тому
Credit Card Application Fraud
BCAA(UK) - Certified Blockchain Security Professional - An Insight
Переглядів 592 місяці тому
BCAA(UK) - Certified Blockchain Security Professional - An Insight
Deceptive Design Patterns in Social Media
Переглядів 613 місяці тому
Deceptive Design Patterns in Social Media
NIST CSF Glimpse
Переглядів 643 місяці тому
NIST CSF Glimpse
NIST PRAM - Privacy Risk Assessment Methodology
Переглядів 923 місяці тому
NIST PRAM - Privacy Risk Assessment Methodology
Crowdstrike Tip of the ice berg
Переглядів 893 місяці тому
Crowdstrike Tip of the ice berg
Periodic Validation of the Personal Data
Переглядів 453 місяці тому
Periodic Validation of the Personal Data
Data Privacy Objectives
Переглядів 395 місяців тому
Data Privacy Objectives

КОМЕНТАРІ