SlideShare ist ein Scribd-Unternehmen logo
1 von 46
Cyber Security for
Small & Medium CA Office
Nanda Mohan D Shenoy
1.Cyber Introduction
Recent Cyber Attacks
Popular Attack Vectors
Rainbow Principle for CAs
Report Incidents & Cyber Crimes
Agenda
2
3
5
2
4
1
Cyber Etymology
3
Confidentiality
Integrity
Availability
Reputation
3
Cyber-The Top Technological Risk
Confidentiality
Integrity
Availability
Reputation
India’s Rank in GCI (195 Countries)
47
5 5
Poll-1
Q1-What are the reasons for increase in Cyber Attacks(Multiple Choice)
i. The Cost of communication
ii. The Application moving from Intranet to Internet
iii. Hacking tools as a service (HaaS)
iv. The proliferation of the Darknet
Q2- What is the linkage between Work from Home (WFH) and Cyber attacks?
i. The attack surface for the hacker has increased
ii. The cost of hacking has got reduced because of WFH
iii. Anybody can see the network Traffic
Q3- The percentage of Traffic which flows through the Surface web /Clearnet as
the over all percentage
i. Less than 15 %
ii. Between 15% and 50 %
iii. Between 51% and 65%
iv. Greater than 65% 6
Why Cyber-1
7
Why Cyber-2 ?
8
Why Cyber-3 ?
9
Borderless Universe
• Cyber is the new hype /fashion whatever you
may call it
• Cyber and data privacy are the two hot topics
that we hear day in and day out.
• The changing face of ransomware attacks{steal,
lock/encrypt and inform}
– Availability
– Confidentiality
• Work From Home saw massive explosion in the
attack surface
10
Ransomware Statistics
• PRESENTATION TITLE
Double Extortion
Bad News for Ransomware
• PRESENTATION TITLE
Ransomware as a service-
Netwalker
• PRESENTATION TITLE
Some of the high-
profile victims
targeted by
NetWalker include
Equinix, Enel Group,
the Argentina immigr
ation
agency, University of
California San
Francisco (UCSF),
and K-Electric
Darkweb
14 14
Carding Forums
5
Darkweb
15
Hacking is a Profession
16
Ramnicu Valcea
16
1.Cyber Introduction
Recent Cyber Incidents
Popular Attack Vectors
Rainbow Principle for CAs
Report Cyber Crimes
Agenda
17
3
5
2
4
1
17
Cyber Impact
18
Year No. of cases
2020 2.90 Lacs
2019 2.46 Lacs
2018 1.59 Lacs
795 Incidents per
day in 2020
Other Recent Attacks
2020 Global Cyber Attack Trends
E-mail Office Files Pdf documents
File based Malware
• PRESENTATION TITLE
COVID & SPAM
Sector wise Analysis
• PRESENTATION TITLE
1.Cyber Introduction
Recent Cyber Incidents
Popular Attack Vectors
Rainbow Principle for CAs
Report Incidents & Cyber Crimes
Agenda
3
5
2
4
1
24
Popular Cyber Attacks
• Phishing
• Email
• Website
• Whaling
• Spear phishing
• Vishing
• Smishing
• Website Defacement
• Trojans
• Cyber Bullying
• Cyber Stalking
• Cyber Espionage
• Cyber Warfare
25 25 25
Seeing is not believing
26
BEC Fraud using Whaling &
Vishing
27
What is wrong with this website?
http://www.pmcarerelieffund.com/
₹17.7 Lacs
₹34.7 Lacs
28
New Generation
29
New Vectors
30
Cyber Bullying & Stalking
31
Live Cyber Threat Global Map
• PRESENTATION TITLE
https://threatmap.checkpoint.com/
1.Cyber Introduction
Recent Cyber Attacks
Popular Attack Vectors
Rainbow Principle for CAs
Report Incidents & Cyber Crimes
Agenda
3
5
2
4
1
33
Rainbow Principle for Cyber
Security
1. Use Genuine OS &Patching
2. Implement Firewall & VPN on all
devices
3. No Administrator rights on
laptops/desktops
4. Awareness amongst employees
5. Restrict Download of any type of
software/Mail attachments
6. Passwords on Tally Client level
/Use Password Vaults and no excel
for saving passwords
7. Regular Backups
Principle for email
क्लिक कर
35
Prevent Identity Theft
• Simplest Way
• 2 FA
• Other Hygiene
• No common password
for financial accounts
and non financial
• Privacy Risk leads to
impersonation risk
• Date of Birth
• Mobile Number
• Emailid etc
36
1.Risk & Opening thoughts
Cyber landscape in COVID Times
Popular Attack Vectors
Cyber Hygiene& Privacy
Report Incidents & Cyber Crimes
Agenda
3
5
2
4
1
37
Responding to Cyber Attacks
38
It is not about getting about
being attacked, it is all about
how you respond to the Cyber
Attack
Reporting Cyber Crimes-1/5
https://cybercrime.gov.in/
39
Main Categories-9
Reporting Cyber Crimes-2/5
40
Reporting Cyber Crimes-3/5
41
Reporting Cyber Crimes-4/5
42
Reporting Cyber Crimes-5/5
43
Summary
Forward/
Click Kar
44
• What is wonder?
• Day after day countless people
die. Yet the living wish to live
forever. O Lord, what can be a
greater wonder
• Day after day countless cyber
attacks happen . Yet the Top
Management thinks that their
organisation will not be
attacked. O Lord, what can be a
greater wonder than this
Conclusion
45
Resources
https://www.youtube.com/channel/UCyxNwXY8j66H1GUDanv-boQ
https://www.slideshare.net/NandaMohanShenoy/
https://www.youtube.com/channel/UCyY-1ZeELIaHC8qeT9p5Hlg
https://www.apnacourse.com/course/cisa
nmds@bestfitsolutions.
in

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Security Implications of the Cloud - CSS ATX 2017
Security Implications of the Cloud - CSS ATX 2017Security Implications of the Cloud - CSS ATX 2017
Security Implications of the Cloud - CSS ATX 2017
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015
 
Cloud Access Security Brokers
Cloud Access Security BrokersCloud Access Security Brokers
Cloud Access Security Brokers
 
(SACON) Wayne Tufek - chapter two - kill chain
(SACON) Wayne Tufek - chapter two - kill chain(SACON) Wayne Tufek - chapter two - kill chain
(SACON) Wayne Tufek - chapter two - kill chain
 
Chapter 1, Transformasi antivirus
Chapter 1, Transformasi antivirusChapter 1, Transformasi antivirus
Chapter 1, Transformasi antivirus
 
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
 
Cyber Resiliency
Cyber ResiliencyCyber Resiliency
Cyber Resiliency
 
NormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration OverviewNormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration Overview
 
DC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthDC970 Presents: Defense in Depth
DC970 Presents: Defense in Depth
 
Best Practices for Network Security Management
Best Practices for Network Security Management Best Practices for Network Security Management
Best Practices for Network Security Management
 
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 
Cynet
CynetCynet
Cynet
 
Security Implications of the Cloud - CSS Dallas Azure
Security Implications of the Cloud - CSS Dallas AzureSecurity Implications of the Cloud - CSS Dallas Azure
Security Implications of the Cloud - CSS Dallas Azure
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
 
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingDomain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter Hacking
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
Security Threat Presentation
Security Threat PresentationSecurity Threat Presentation
Security Threat Presentation
 

Ähnlich wie Cyber security for Small and Medium CA

How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
Claranet UK
 

Ähnlich wie Cyber security for Small and Medium CA (20)

Security Lifecycle Management Process
Security Lifecycle Management ProcessSecurity Lifecycle Management Process
Security Lifecycle Management Process
 
Covid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber ThreatsCovid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber Threats
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar Presentation
 
Retail Week: Cloud Security
Retail Week: Cloud SecurityRetail Week: Cloud Security
Retail Week: Cloud Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesCloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and Techniques
 
188
188188
188
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software development
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.ppt
 
3 steps to gain control of cloud security
3 steps to gain control of cloud security 3 steps to gain control of cloud security
3 steps to gain control of cloud security
 
Cybersecurity Risk from User Perspective
Cybersecurity Risk from User PerspectiveCybersecurity Risk from User Perspective
Cybersecurity Risk from User Perspective
 
Network Security in the Age of the Third Platform
Network Security in the Age of the Third PlatformNetwork Security in the Age of the Third Platform
Network Security in the Age of the Third Platform
 
Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification course
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
 
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IA
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 

Mehr von Nanda Mohan Shenoy

Mehr von Nanda Mohan Shenoy (20)

Srimadbhagavata_parayanam_v3.pdf
Srimadbhagavata_parayanam_v3.pdfSrimadbhagavata_parayanam_v3.pdf
Srimadbhagavata_parayanam_v3.pdf
 
D07_SVCMahatmyam_v1.pdf
D07_SVCMahatmyam_v1.pdfD07_SVCMahatmyam_v1.pdf
D07_SVCMahatmyam_v1.pdf
 
D06_SVCMahatmyam_v1.pdf
D06_SVCMahatmyam_v1.pdfD06_SVCMahatmyam_v1.pdf
D06_SVCMahatmyam_v1.pdf
 
D05_SVCMahatmyam_v1.pdf
D05_SVCMahatmyam_v1.pdfD05_SVCMahatmyam_v1.pdf
D05_SVCMahatmyam_v1.pdf
 
D04_SVCMahatmyam_v1.pdf
D04_SVCMahatmyam_v1.pdfD04_SVCMahatmyam_v1.pdf
D04_SVCMahatmyam_v1.pdf
 
D03_SVCMahatmyam_v1.pdf
D03_SVCMahatmyam_v1.pdfD03_SVCMahatmyam_v1.pdf
D03_SVCMahatmyam_v1.pdf
 
D02_SVCMahatmyam_v1.pdf
D02_SVCMahatmyam_v1.pdfD02_SVCMahatmyam_v1.pdf
D02_SVCMahatmyam_v1.pdf
 
D01_SVCMahatmyam_v1.pdf
D01_SVCMahatmyam_v1.pdfD01_SVCMahatmyam_v1.pdf
D01_SVCMahatmyam_v1.pdf
 
09_Sundara Kandam_v3.pdf
09_Sundara Kandam_v3.pdf09_Sundara Kandam_v3.pdf
09_Sundara Kandam_v3.pdf
 
08_Sundara Kandam_v3.pdf
08_Sundara Kandam_v3.pdf08_Sundara Kandam_v3.pdf
08_Sundara Kandam_v3.pdf
 
07_Sundara Kandam_v3.pdf
07_Sundara Kandam_v3.pdf07_Sundara Kandam_v3.pdf
07_Sundara Kandam_v3.pdf
 
06_Sundara Kandam_v3.pdf
06_Sundara Kandam_v3.pdf06_Sundara Kandam_v3.pdf
06_Sundara Kandam_v3.pdf
 
05_Sundara Kandam_v3.pdf
05_Sundara Kandam_v3.pdf05_Sundara Kandam_v3.pdf
05_Sundara Kandam_v3.pdf
 
04_Sundara Kandam_v3.pptx
04_Sundara Kandam_v3.pptx04_Sundara Kandam_v3.pptx
04_Sundara Kandam_v3.pptx
 
03_Sundara Kandam-v3.pdf
03_Sundara Kandam-v3.pdf03_Sundara Kandam-v3.pdf
03_Sundara Kandam-v3.pdf
 
02_Sundara Kandam_v3.pdf
02_Sundara Kandam_v3.pdf02_Sundara Kandam_v3.pdf
02_Sundara Kandam_v3.pdf
 
01_Sundara Kandam_v3.pdf
01_Sundara Kandam_v3.pdf01_Sundara Kandam_v3.pdf
01_Sundara Kandam_v3.pdf
 
CEPAR Conference _20230204.pdf
CEPAR Conference _20230204.pdfCEPAR Conference _20230204.pdf
CEPAR Conference _20230204.pdf
 
Digitial Personal Data Bill 2022 feedback
Digitial Personal Data Bill 2022 feedbackDigitial Personal Data Bill 2022 feedback
Digitial Personal Data Bill 2022 feedback
 
IS17428_ISACA_Chennai_20220910.pptx
IS17428_ISACA_Chennai_20220910.pptxIS17428_ISACA_Chennai_20220910.pptx
IS17428_ISACA_Chennai_20220910.pptx
 

Kürzlich hochgeladen

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Kürzlich hochgeladen (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

Cyber security for Small and Medium CA

Hinweis der Redaktion

  1. Poll 1- on privacy as per GDPR and q-2 will be the fine imposed
  2. Risk perception of CFO/CISO/CEO etc will keep varying
  3. https://www.ubs.com/global/en/our-firm/business-unusual/coronavirus-fraud-awareness.html https://www.interpol.int/en/News-and-Events/News/2020/Unmasked-International-COVID-19-fraud-exposed https://www.fraud-magazine.com/article.aspx?id=4295012581 https://www.forbes.com/uk/advisor/personal-finance/2021/01/05/fraud-5-hot-scams-in-2021-and-how-to-avoid-them/ https://www.bbc.com/news/business-53573408 https://www.experian.com/data-breach/data-breach-industry-forecast https://www.advisenltd.com/
  4. Poll 1- on privacy as per GDPR and q-2 will be the fine imposed
  5. https://www.gktoday.in/current-affairs/digital-banking-over-2-9-lakh-cyber-security-incidents-reported-in-2020/amp/#Cases_of_cyber_incidents
  6. https://timesofindia.indiatimes.com/business/india-business/india-is-second-in-global-ransom-payouts-for-cyberattacks-survey/articleshow/79290107.cms
  7. https://www.sonicwall.com/resources/2020-cyber-threat-report-mid-year-update-pdf/
  8. Poll 1- on privacy as per GDPR and q-2 will be the fine imposed
  9. APT attack discovered by Kaspersky The APT platform consists of two main parts: Tokyo and Yokohama. Both were detected on all infected computers. Tokyo acts as the main back door and delivers the second-stage malware. Interestingly, it remains in the system even after the second phase starts, evidently to operate as an additional communication channel. Yokohama, meanwhile, is the weapon payload of the second stage. It creates a virtual file system complete with plugins, third-party libraries, and configuration files. Its arsenal is extensive in the extreme: Stealing cookies, Intercepting documents from the print queue, Collecting data about the victim (including a list of backup copies of their iOS device), Recording and taking screenshots of VoIP calls, Stealing optical disc images made by the victim, Indexing files, including those on external drives, and potentially stealing specific files when the drive is detected again.
  10. https://threatmap.checkpoint.com/ https://www.digitalattackmap.com/#anim=1&color=3&country=ALL&list=1&time=18672&view=map https://threatmap.bitdefender.com/ https://www.imperva.com/cyber-threat-attack-map/ https://threatmap.fortiguard.com/ https://www.fireeye.com/cyber-map/threat-map.html https://securitycenter.sonicwall.com/m/page/worldwide-attacks https://threatbutt.com/map/
  11. Poll 1- on privacy as per GDPR and q-2 will be the fine imposed
  12. Poll 1- on privacy as per GDPR and q-2 will be the fine imposed