{"id":20323,"date":"2022-02-28T08:59:56","date_gmt":"2022-02-28T12:59:56","guid":{"rendered":"https:\/\/www.itworldcanada.com?p=474649"},"modified":"2022-03-14T13:01:44","modified_gmt":"2022-03-14T17:01:44","slug":"cyber-security-today-feb-28-2022-tips-to-protect-against-expected-russia-ukraine-cyber-retaliation-and-more","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/cyber-security-today-feb-28-2022-tips-to-protect-against-expected-russia-ukraine-cyber-retaliation-and-more\/","title":{"rendered":"Cyber Security Today, Feb. 28, 2022 \u2013 Tips to protect against expected Russia-Ukraine cyber retaliation, and more"},"content":{"rendered":"<p>Tips to protect against expected Russia-Ukraine cyber retaliation, and more.<\/p>\n<p>Welcome to Cyber Security Today. It\u2019s Monday, February 28th. I\u2019m Howard Solomon, contributing reporter on cybersecurity for <em>ITWorldCanada.com.<\/em><\/p>\n<p><iframe loading=\"lazy\" style=\"border: none;\" title=\"Libsyn Player\" src=\"https:\/\/html5-player.libsyn.com\/embed\/episode\/id\/22270964\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/forward\/render-playlist\/no\/custom-color\/000000\/\" width=\"100%\" height=\"90\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<table style=\"width: 100%;\">\n<tbody>\n<tr>\n<td><a href=\"https:\/\/www.amazon.com\/ITWC-Cyber-Security-Today\/dp\/B07BRNG89P\/ref=sr_1_1?s=digital-skills&amp;ie=UTF8&amp;qid=1522688435\"  rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-396718 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2017\/09\/sub-alexa-200.png\" alt=\"Cyb er Security Today on Amazon Alexa\" width=\"200\" height=\"74\" border=\"none\" \/><\/a><\/td>\n<td><a href=\"https:\/\/www.google.com\/podcasts?feed=aHR0cDovL2N5YmVyc2VjdXJpdHl0b2RheS5saWJzeW4uY29tL3Jzcw%3D%3D\"  rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" loading=\"lazy\" class=\"thumbnail aligncenter wp-image-408712 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2018\/09\/sub-gp-200.png\" alt=\"Cyber Security Today on Google Podcasts\" width=\"200\" height=\"74\" \/><\/a><\/td>\n<td><a href=\"https:\/\/itunes.apple.com\/ca\/podcast\/cyber-security-today\/id1363182054\"  rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-396720 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2017\/09\/sub-itunes-200.png\" alt=\"Subscribe to Cyber Security Today on Apple Podcasts\" width=\"200\" height=\"74\" border=\"none\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Firms in countries imposing sanctions<\/strong> on Russia for invading Ukraine are bracing for possible retaliatory cyber attacks. Some threat groups are taking sides. For example <a href=\"https:\/\/www.itworldcanada.com\/article\/conti-ransomware-gang-backs-russia-vows-retaliation-for-war-activities-against-moscow\/474519\"  rel=\"noopener\">the Conti ransomware group is threatening<\/a> to attack those against Russia. <a href=\"http:\/\/blog.talosintelligence.com\/2022\/02\/current-executive-guidance-for-ongoing.html?utm_source=feedburner&amp;utm_medium=email\"  rel=\"noopener\">Over the weekend researchers at Cisco Systems warned<\/a> there may be cyber operations against Western countries. The goal will be to erode public support for sanctions against Russia through attacks against critical infrastructure like banks or energy companies. What IT departments should remember, the report says, is that poor cybersecurity hygiene, and out-of-date systems and software will lead to successful attacks. However, Cisco says, broad use of multifactor authentication by employees to protect logins, network segmentation, visibility of network traffic, having complete knowledge of where your sensitive data is, prioritized patching and intelligence programs that actively drive changes in your defenses are all key to successfully weathering attacks.<\/p>\n<p><strong>Graphics card and chip maker Nvidia<\/strong> has been fighting a cyber attack since last week. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/gpu-giant-nvidia-is-investigating-a-potential-cyberattack\/\"  rel=\"noopener\">Nvidia told the BleepingComputer news service<\/a> that the incident is still being evaluated but its commercial activities were not affected. However, the Lapsus$ hacking group claims it has stolen 1 TB of data from the company. On the other hand, Lapsus$ reportedly says Nvidia struck back and apparently encrypted some of the gang\u2019s stolen data. Lapsus$ claims it has a backup.<\/p>\n<p><strong>By the way,<\/strong> some makers of graphic cards \u2013 including Nvidea &#8212; have crippled some of their lower-end products to make it harder for them to be used for mining cryptocurrency. In response, people post allegedly special drivers to get around the limitations. However, installing drivers that aren\u2019t from a manufacturer\u2019s website is risky. <a href=\"https:\/\/arstechnica.com\/gadgets\/2022\/02\/driver-that-promised-faster-ethereum-mining-for-nvidia-gpus-is-full-of-viruses\/\"  rel=\"noopener\">The Ars Technica news service found a report<\/a> that tested one anonymous driver. It concluded the code alters Windows for no good reason.<\/p>\n<p><strong>Axis Communications<\/strong>, a video surveillance system manufacturer based in Sweden, is still dealing with a cyber-attack from last weekend. Although many of its websites around the world are now up, <a href=\"https:\/\/status.axis.com\/\"  rel=\"noopener\">as of Sunday the Device Upgrades portal was reporting a major outage<\/a>. In its latest status update, published last Thursday, Axis said there was no indication so far any customer or partner data was affected. The company says it was able to stop the attack before it was completed.<\/p>\n<p><strong>The operators of the TrickBot malware botne<\/strong>t have shut down their server infrastructure. <a href=\"https:\/\/therecord.media\/trickbot-gang-shuts-down-botnet-after-months-of-inactivity\/\"  rel=\"noopener\">That\u2019s according to a report from The Record news service<\/a>. That\u2019s the good news. The bad news is that the Conti ransomware gang has reportedly recruited several top members of the TrickBot gang to develop one of the malware\u2019s backdoor modules into a new weapon. TrickBot started out as malware that stole bank login usernames and passwords from victims and evolved into a hacking toolkit with modules that cybercrime gangs could use to add things like ransomware and data theft capabilities. In the fall of 2020 U.S. authorities and cybersecurity firms took down much of its server delivery infrastructure. But the botnet delivering TrickBot carried on until last December. Until this month\u2019s dismantling, the botnet had been inactive.<\/p>\n<p><strong>Finally,<\/strong> the <a href=\"https:\/\/www.antifraudcentre-centreantifraude.ca\/scams-fraudes\/investment-investissement-eng.htm\"  rel=\"noopener\">Canadian Anti-Fraud Centre is warning people with Instagram accounts<\/a> to beware of phishing emails with links to fake Instagram login pages. Victims tricked into logging into these pages give away their usernames and passwords. Then the scammers try to blackmail the victims into recording a video of themselves promoting fake cryptocurrency platforms. If they do, the video is posted on the victim\u2019s social media accounts with a link in the hopes the victim\u2019s followers will trust the cryptocurrency site is legit and they\u2019ll make a fraudulent purchase. First, don\u2019t click on links or download documents in text messages or emails unless you are sure who sent them. Be suspicious of a link that leads to any site that you have to log into. And to protect against your username and password being stolen and used by crooks, enable multifactor authentication as an extra step needed when you login to Instagram.<\/p>\n<p>That\u2019s it for now. Remember links to details about podcast stories are in the text version at ITWorldCanada.com.<\/p>\n<p>You can follow Cyber Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker.<\/p>\n<p>Thanks for listening. I\u2019m Howard Solomon<\/p>\n<p>The post <a href=\"https:\/\/www.itworldcanada.com\/article\/cyber-security-today-feb-28-2022-tips-to-protect-against-expected-russia-ukraine-cyber-retaliation-and-more\/474649\">Cyber Security Today, Feb. 28, 2022 \u2013 Tips to protect against expected Russia-Ukraine cyber retaliation, and more<\/a> first appeared on <a href=\"https:\/\/www.itworldcanada.com\/\">IT World Canada<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today&#8217;s episode reports on improving cyber defences, attacks on Nvidea and Axis Communications, TrickBot finally goes down and a warning to Instagram users<\/p>\n<p>The post <a href=\"https:\/\/www.itworldcanada.com\/article\/cyber-security-today-feb-28-2022-tips-to-protect-against-expected-russia-ukraine-cyber-retaliation-and-more\/474649\">Cyber Security Today, Feb. 28, 2022 \u2013 Tips to protect against expected Russia-Ukraine cyber retaliation, and more<\/a> first appeared on <a href=\"https:\/\/www.itworldcanada.com\/\">IT World Canada<\/a>.<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[360,16],"tags":[389,388],"class_list":["post-20323","post","type-post","status-publish","format-standard","hentry","category-podcasts","category-security","tag-cyber-security-today","tag-privacy-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/20323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=20323"}],"version-history":[{"count":1,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/20323\/revisions"}],"predecessor-version":[{"id":20324,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/20323\/revisions\/20324"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=20323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=20323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=20323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}