
Over 1.000 companies are facing infected WordPress websites whose security is threatened by JavaScript backdoors. The attack method uses four different backdoors for maximum damage. Companies must therefore implement proactive security strategies.
Tim explained via video conference that there are usually two ways for an attack like the one in Ludwigshafen: The attack via a technical vulnerability is less likely. More often, hackers break into the system via the human factor (e.g. through phishing emails) in order to spread there more and more, says Tim.
The aim is, on the one hand, to encrypt the system-internal data for blackmail and, on the other hand, to exfiltrate it in order to be able to additionally threaten to publish it.
The more likely and common way is the human factor.
Tim Schughart | CEO ProSec
You can watch the whole article in the Sat1 show at 17:30 p.m. with Tim as an expert here:
Sat1 Mediathek 17:30 p.m. LIVE – Broadcast from October 28.10.2022th, XNUMX
Over 1.000 companies are facing infected WordPress websites whose security is threatened by JavaScript backdoors. The attack method uses four different backdoors for maximum damage. Companies must therefore implement proactive security strategies.
Hackers use misconfigurations in AWS for targeted phishing attacks. Companies are thus unknowingly opening their IT infrastructure to attacks. Traditional security measures often fail to defend against this threat.
Security researchers discover a security hole in Apple's "Find My" network that enables industrial espionage. Using the "nRootTag" method, attackers can secretly turn devices into tracking devices. Companies around the world are alarmed and are looking for protective measures.
We use cookies, and Google reCAPTCHA, which loads Google Fonts and communicates with Google servers. By continuing to use our website, you agree to the use of cookies and our privacy policy.