- 220
- 25 465
Subbu On Cyber, Privacy and Compliance
India
Приєднався 5 сер 2021
This channel is owned by Subramaniam Sankaran. One of the best instructors for Cyber Security, Data Protection, CDPO, Security Risks, and Offensive hacking.
ISSS Cyber news 06112024
A 35-year-old woman from the Hyderabad city became the latest victim of cyber fraud and ended up losing over Rs. 1 lakh to cyber fraudsters who posing as bank executives, cheated her on pretext of updating her personal details.
The victim received a WhatsApp call from the unidentified scammers, who claimed that she needed to update her bank account details or her transactions could be stopped.
According to the cybercrime police, when the victim was reluctant, the fraudster put her in fear that if the details were not updated, Rs.5,000 would be deducted from her bank account as penalty.
“The fraudster asked her to open her mobile banking account promising to guide her through the process. As soon as she did, the fraudster gained access to her e-mail ID and other details,” said a cybercrime official.
Realising it was a fraudulent call, the victim immediately contacted the bank authorities and raised a complaint. Despite her prompt actions, Rs. 1,08,990 had been deducted from her credit card. Based on her complaint, the cybercrime police booked a case and are investigating.
In case of a cybercrime fraud, Dial - 1930 or visit www. cybercrime.gov.in. In case of any emergency of cyber frauds, call or WhatsApp on 8712665171.
The National Informatics Centre (NIC) has warned government officials against trusting the caller ID information without verification and divulging sensitive information. In the advisory, the cyber security body said cyber criminals may impersonate trusted entities to launch a "vishing" attack.
"Attackers may impersonate trusted entities, such as senior government officials, law enforcement agencies, or technical support personnel," the advisory issued recently by the National Informatics Centre (NIC) said.
The severity of the communication has been categorised as "high".
The body said the attackers can manipulate the caller ID information to create the impression that the phone call was coming from a legitimate number.
In the advisory, the body said there had been an increase in the number of vishing attacks against government officials. These attacks have been used to acquire confidential information and gain unauthorised access to official systems".
The Cyber Security Council and Immersive Labs, the leader in people-centric cyber resilience, has announced the successful completion of their recent Dubai Cyber Drill that reinforced UAE enterprises' cybersecurity posture against Critical National Infrastructure (CNI) threats.
The event included attendees from 25 major organisations representing various sectors - from financial services and telecommunications to healthcare and government - and closed with an awards ceremony.
A cybersecurity expert said that there is a new threat emerging with QR codes that carry ransomware and other viruses.
One of the malicious attack vectors now is people will go into restaurants or see display windows and other posters where it says scan this QR code, and they’ll basically replace it with a QR code that if you actually click on the link, it will download a malware for you.”
The victim received a WhatsApp call from the unidentified scammers, who claimed that she needed to update her bank account details or her transactions could be stopped.
According to the cybercrime police, when the victim was reluctant, the fraudster put her in fear that if the details were not updated, Rs.5,000 would be deducted from her bank account as penalty.
“The fraudster asked her to open her mobile banking account promising to guide her through the process. As soon as she did, the fraudster gained access to her e-mail ID and other details,” said a cybercrime official.
Realising it was a fraudulent call, the victim immediately contacted the bank authorities and raised a complaint. Despite her prompt actions, Rs. 1,08,990 had been deducted from her credit card. Based on her complaint, the cybercrime police booked a case and are investigating.
In case of a cybercrime fraud, Dial - 1930 or visit www. cybercrime.gov.in. In case of any emergency of cyber frauds, call or WhatsApp on 8712665171.
The National Informatics Centre (NIC) has warned government officials against trusting the caller ID information without verification and divulging sensitive information. In the advisory, the cyber security body said cyber criminals may impersonate trusted entities to launch a "vishing" attack.
"Attackers may impersonate trusted entities, such as senior government officials, law enforcement agencies, or technical support personnel," the advisory issued recently by the National Informatics Centre (NIC) said.
The severity of the communication has been categorised as "high".
The body said the attackers can manipulate the caller ID information to create the impression that the phone call was coming from a legitimate number.
In the advisory, the body said there had been an increase in the number of vishing attacks against government officials. These attacks have been used to acquire confidential information and gain unauthorised access to official systems".
The Cyber Security Council and Immersive Labs, the leader in people-centric cyber resilience, has announced the successful completion of their recent Dubai Cyber Drill that reinforced UAE enterprises' cybersecurity posture against Critical National Infrastructure (CNI) threats.
The event included attendees from 25 major organisations representing various sectors - from financial services and telecommunications to healthcare and government - and closed with an awards ceremony.
A cybersecurity expert said that there is a new threat emerging with QR codes that carry ransomware and other viruses.
One of the malicious attack vectors now is people will go into restaurants or see display windows and other posters where it says scan this QR code, and they’ll basically replace it with a QR code that if you actually click on the link, it will download a malware for you.”
Переглядів: 28
Відео
Cyber Insurance
Переглядів 482 години тому
Cyber insurance is a type of insurance policy that helps protect organizations from financial losses and liabilities resulting from cyber attacks and data breaches. Here are the key points about cyber insurance: What Cyber Insurance Covers Cyber insurance typically covers: - Data breach costs (notification, credit monitoring, etc.) - Business interruption losses - Cyber extortion/ransomware pay...
ISSS Cyber News 04112024
Переглядів 327 годин тому
Dynamic CVV Two Bengaluru Residents Lose Rs 95 Lakh to Cyber Fraudsters. Deep fake - Narayana Murthy and Mukesh Ambani Councils in the U.K. have been affected by a string of (DDoS) attacks. The pro-Russian hacker group NoName057(16) has taken responsibility for some of the attacks. Middlesbrough Council blamed “foreign hackers” for bringing down its website twice in one week. The attacks began ...
ISSS Cyber News 01112024
Переглядів 2614 годин тому
DPDPA is all set to hit the Indian companies and to be announced as a law before 20th November Microsoft Warns of Chinese Botnet Exploiting Router Flaws for Credential Theft using password spray attack. The botnet malware has been observed targeting several brands of SOHO routers and VPN appliances, including TP-Link, Zyxel, Asus, Axentra, D-Link, and NETGEAR. A large-scale malicious operation ...
ISSS Cyber News 29102024
Переглядів 2921 годину тому
Jio Hotstar Domain Controversy Explained: Full Story Behind The Domain Dispute; Meet Jainam & Jivika The JioHotstar.com domain controversy has taken a surprising turn as it appears that the domain, originally secured by an anonymous app developer in Delhi, has now been sold to two siblings in Dubai. The drama began when the domain, seen as a prime candidate for the newly merged JioCinema and Ho...
Quick Bites nmap
Переглядів 45День тому
Nmap, short for Network Mapper, is a powerful open-source tool designed for network exploration and security auditing. Developed by Gordon Lyon (also known as Fyodor), Nmap allows users to discover hosts and services on a computer network by sending packets and analyzing the responses. Its initial release was in September 1997, and it has since evolved into one of the most widely used network s...
ISSS Cyber News 28102024
Переглядів 19День тому
At least 10 major hotels in Uttar Pradesh's Lucknow, mostly premium properties, received bomb threats via emails on Sunday. The email threatened that the explosion would take place if the ransom demand of $55,000 (Rs 4,624,288) is not met. "Bombs are hidden in black bags on the grounds of your hotel. I want $55,000, or I will detonate the explosives and blood will spread everywhere. Any attempt...
Third Party Security
Переглядів 53День тому
Understanding Third-Party Security Third-party security refers to the measures and protocols implemented to protect an organization from risks associated with external vendors, suppliers, or service providers that have access to sensitive data and systems. These third parties can include cloud service providers, payroll processors, and various contractors. While engaging with these entities can...
ISSS Cyber news 27102024
Переглядів 71День тому
UnitedHealth has confirmed for the first time that over 100 million people had their personal information and healthcare data stolen in the Change Healthcare ransomware attack, marking this as the largest healthcare data breach in recent years. Health insurance information Health information Billing, claims and payment information Other personal information such as Social Security numbers, driv...
Argus Recon toolkit
Переглядів 174День тому
Argus is a comprehensive information gathering toolkit developed by Jasonxtn, designed to facilitate reconnaissance and network exploration. Here’s a detailed overview of its features, installation process, and usage. Overview of Argus Toolkit Argus is a Python-based toolkit that streamlines the process of information gathering and reconnaissance. It is tailored for users conducting research or...
Cyber news 25102024
Переглядів 34День тому
Cyber Slavery Crisis: A report reveals that over 29,000 Indian nationals have gone missing in Southeast Asia since January 2022, many believed to be victims of cyber slavery rings. These criminal networks lure individuals with false job offers and force them into cybercrime operations, resulting in severe economic and personal consequences
DDoS and Cyber news
Переглядів 4214 днів тому
A Distributed Denial-of-Service (DDoS) attack is a malicious attempt to disrupt the normal functioning of a targeted server, service, or network by overwhelming it with a flood of internet traffic. This type of attack is executed using multiple compromised computer systems, often referred to as a botnet, which can include various devices such as computers and Internet of Things (IoT) devices13....
Sextortion and First AI Case
Переглядів 4814 днів тому
Sextortion is a form of sexual exploitation that involves coercion through the threat of releasing private sexual material. This crime can occur in various contexts, affecting both adults and children, and often utilizes digital platforms for its execution. Definition and Mechanisms Sextortion combines elements of sex and extortion, where perpetrators use non-physical coercion to demand sexual ...
Collusion Attack Quishing Mobile attack- Cyber news 23102024
Переглядів 5714 днів тому
Collusion Attacks in Social Engineering Collusion attacks in social engineering involve multiple attackers working together to manipulate individuals or systems, enhancing the effectiveness of their schemes. Mechanisms of Collusion in Social Engineering 1. Information Sharing: - Attackers pool their knowledge about a target organization or individual, allowing them to craft more convincing narr...
Cyber Blitzkriegs and Cyber news 22102024
Переглядів 2314 днів тому
Cyber Blitzkrieg refers to a strategic concept in cyber warfare that draws parallels to the traditional military tactic of blitzkrieg, or "lightning war." This term is used to describe rapid, overwhelming cyber attacks aimed at incapacitating an adversary's digital infrastructure with speed and surprise. Key Characteristics of Cyber Blitzkrieg Speed and Surprise: Just like the original blitzkri...
Subbu Teaches CISSP Civil Law vs Criminal Law
Переглядів 732 місяці тому
Subbu Teaches CISSP Civil Law vs Criminal Law
Subbu Teaches CISSP Common law vs Civil Law
Переглядів 372 місяці тому
Subbu Teaches CISSP Common law vs Civil Law
Subbu Teaches CISSP Evidence Qualities
Переглядів 262 місяці тому
Subbu Teaches CISSP Evidence Qualities
BCAA(UK) - Certified Blockchain Security Professional - An Insight
Переглядів 592 місяці тому
BCAA(UK) - Certified Blockchain Security Professional - An Insight
Deceptive Design Patterns in Social Media
Переглядів 613 місяці тому
Deceptive Design Patterns in Social Media
NIST PRAM - Privacy Risk Assessment Methodology
Переглядів 923 місяці тому
NIST PRAM - Privacy Risk Assessment Methodology
Periodic Validation of the Personal Data
Переглядів 453 місяці тому
Periodic Validation of the Personal Data
Very Insightful.. Thank you Subbu for sharing this..
Thanks bhai
Good one, Third party Risk Assessment is an important aspect for corporate security
it was nice session👍
Thanks Manoj.. thanks for your interactions and to Bharat
sir keep sharing ur knowledge, its soo helpful
Thank you, I will.... 🙏.
Thanks Subbu, point shared by you will definitely help me in meeting my requirements.
Thanks Manoj..glad that..at times I am helpful 😄
Beautifully categorised and well explained with examples. Very informative.
Thanks a zillion. Credit goes to Mr.Mohan
"Dee-dahs" not "dee-doo-S" lol
Thanks for pointing out mate.. that's an mistake.. I would be glad if you were able to understand the objective of the video
Great sir well explained and easy to understand
Nice
Thanks brother
Good warning subbu.
Thanks sister
Good information.
Thanks sister
Promo SM
Let's keep the momentum of weekly webinar👍
Yes Manoj.. we are trying the best
Useful
Thanks brother
Very informative
Glad it was helpful!
Nice session 👍
Thank you 👍
Educative
Thanks brother 😊...
Remainds me of Train friendships, where biscuits played a major role. I knew an astrologer who shared his address and other particulars, one fine day goons visited his place and demanded cash. Today, people should be aware with whom they are sharing their contacts.
Yes..they need to be aware.
A new approach!
🙏
Useful
Enlightening. These tips are utmost needed in these days of net banking
Thanks big brother
Very interactive session 👍
Thanks Manoj.. you all made it very interactive and engaging
Fun can be a way for crime. New twist in crime. Please keep up your informative posts.
Unintentionally funny 🤣
Very useful
Thanks a zillion big brother
Superb job . Valuable information thanks.
Thanks you very much..my sister
Very important point
explained very well👍👍
Thank you 😃
Eye opening
Thanks my brother
Very vital information. Will be followed by many
Thanks my Big brother
Nice sevice to public
Thanks to my big brother
U are doing great work
Thank you so much
Ur doing a great job
Thanks a zillion
Good information Update this kind of video Thank you 😊
Sure 👍
Keep posting such awareness videos👍
Thank you, I will
Useful info. Thanks.
Glad it was helpful!
One of the key take away - What cannot be measured cannot be managed and what cannot be managed - cannot be improved🙏
Yes...
Excellent explanation sir 👍
session is comprehensive and insightful.
Thanks you vert much..
Very well explained in short video👍
Thanks Manoj.. 🙂
Nice explanation....
Thanks for liking
what's her name ???
Good job! Like it! Thanks!
Thank you too!
How can I move files from the target machine to my own machine?
Get/put will work after ftp pass through
How can we move files from the machine we hacked? How can we upload the files?
Yes..try get/put please use cd/lcd to traverse between the directly
How long would this attack take would they need you to keep teams open for awhile or would you be had pretty quickly upon opening the meeting?
Means opportunity and motive is needed for hack.. as long as there is an opportunity hacker is connected
content is great but i suggest upgrading your mic system to better quality !!!!!
Noted. Shokran Ovais
Though i have attended your session on this subject, but i must say that each session on same topic has different flavour of informations🙏👍
Thanks Manoj.. 😊..
Thank you sir, now I got nice clarity about this new term.
Always welcome Sreekanth... :). Thanks
Bruh