The Recorded Future cyber security experts, “local and international players are waging a secondary war through internet control and other cyber means”.
The Armed Forces could admit foreign nationals for highly specialized roles to overcome the skilled labor shortage and better protect the country against new threats.
The cyber security experts compiled the top ten of the malicious codes. The first one is Coinhive followed by Cryptoloot, Andromeda, Roughted, Dorkbot, Jsecoin, Emoter, Conficker, XMRing and Nivdort.
Political agreement on the Cybersecurity ACT. It will reinforce the ENISA mandate and establish an European framework for digital security certification.
Velvet Security cyber security experts: The malware also steals information and credentials. It has spreaded really fast after cybercrime compromised a supply chain.
The cyber criminals spread fake reward programs, limited to a couple of minutes. Especially via Smishing. This to avoid users’s checks and increase the hype.
Check Point cyber security experts: An attacker could exploit a flaw in the system's handling of external storage to inject malicious code and escalate his privileges.