Page 1 of 1

This is how the story ended

Posted: Wed Feb 12, 2025 9:26 am
by relemedf5w023
- So did I do everything right? Otherwise I wonder, what if I'm wrong?

- Yes, that's right, that's right! Calm down! Good for you for calling back! And remember, if you don't know, call me back right away or call the bank's hotline, it's written on your card. And don't worry! You're not bothering anyone, the hotline was created to help.


Unfortunately, such stories only end well in fairy tales. More often, cardholders give in to fraudsters and give them their money themselves. Security researchers from Zecurion have reported a new luxembourg whatsapp data scheme, in which attackers send citizens SMS messages, supposedly warning about blocking a bank card due to a suspicious transaction. To confirm the transaction, the fraudsters offer to call the specified phone number, however, when a person contacts the attackers, they are asked to provide card details. Then, using the information received, the hackers withdraw funds to their accounts. There are already about a hundred victims, and the damage amounts to about 2 million rubles.

SOAR: A Promising Approach to Information Security
A study conducted by Demisto shows that organizations ' information security monitoring centers are extremely overwhelmed by the number of threat alerts and are potentially ready to implement new approaches related to the use of SOAR technologies.

One of the new security acronyms that has emerged in recent years is SOAR (Security Orchestration, Automation and Response). In terms of the words that make up the acronym, Orchestration connects different sets of data and security technologies to work together. Automation should minimize human involvement in the repetitive tasks of the incident response process, reducing the time to resolution. Response is at the heart of SOAR and connects orchestrated elements of different technologies in an automated manner to resolve incidents.

SOAR technology, outlined in the State of SOAR Report 2018, released September 6 by Demisto, is designed to help enterprises address many of the pain points associated with information security.