The official website SK

The gov.sk domain is official

This is the official website of the public authority of the Slovak Republic. Official websites mainly use the gov.sk domain. Links to individual websites of public authorities can be found at this link.

This page is secured

Be careful and always make sure that you share information only through the secure website of the Slovak public administration. A secure page always starts with https:// before the domain name of the website.

About Us Old

TL;DR: Even Banks Cannot Avoid Cyberattacks (9th and 10th Weeks)

A hacker sells the data of a multinational corporation and a subsidiary of an Indian bank; Emotet has resumed its activity; there has been a major ransomware attack on a hospital; and a manual for decrypting the MortalKombat ransomware has been published. Security forces arrested members of a well-known ransomware gang; and also managed to…

Warning of critical vulnerabilities in Cisco telephony devices

The National Cyber Security Centre SK-CERT is warning of vulnerabilities in Cisco telephony devices that could be exploited by remote unauthenticated attackers for arbitrary code execution (ACE) or denial of service (DoS). Critical vulnerabilities identified by CVE-2023-20078 and CVE-2023-20079 could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service….

Warning of Increased Risk of Cyberattacks

The National Security Authority (hereinafter referred to as “the NSA”) issues a warning of an increased risk of cybersecurity incidents by pro-Russian oriented community hacker groups against Slovak targets in relation to securing the networks and information systems of operators of essential services, including elements of critical infrastructure and other organisations. The warning is valid…

TL;DR: Beware of Attacking SMS! (8th Week)

Two major cyberattacks started with a text message from an attacker; and data of tens of millions of Indian railway travellers leaked. Cybercriminals have started to actively exploit the chatbot to attract potential victims; a ransomware gang makes money from insurance companies; and security forces achieved successes and one failure. Did the investigators underestimate the…

ENISA Updated the Risk Analysis Methodology

The European Union Agency for Cybersecurity (ENISA) yesterday published the “Interoperable EU Risk Management Toolbox” which provides a comprehensive framework for managing cybersecurity risks across different sectors. The toolbox is designed to enable organisations to identify, assess and manage risks in a consistent and effective manner regardless of the size of the organisation, sector or…

Warning of OpenSSH vulnerability

The National Cyber Security Centre SK-CERT warns of a vulnerability in OpenSSH that could be exploited by remote unauthenticated attackers for remote code execution (RCE) or denial of service (DoS). OpenSSH is a popular tool used for secure communication, remote access or secure data transfer. It is an open-source implementation of the Secure Shell (SSH)…

TL;DR: State of Emergency (6th and 7th Week)

A city in California had to declare a state of emergency after a ransomware attack; a source code leaked from a social news aggregation platform; Dota players need to be more careful with game modes; and Cloudflare successfully blocked a record-breaking DDoS attack. Ransomware decryptors were also released; and the slowdown of the Tor anonymization…

Warning of Multiple Vulnerabilities in Apple Products

The National Cyber Security Centre SK-CERT warns of several vulnerabilities in Apple products that could be exploited by attackers for remote code execution or information theft. Apple has released a patch for several vulnerabilities, including several critical ones that allow attackers to perform several malicious activities, such as denial of service, privilege escalation, remote code…

TL;DR: Recycling Differently (5th Week)

A ransomware gang has shown that they take unusual care of nature; users whom leaked data due to a T-Mobile attack and use Google Fi have been advised to change out their SIM cards; and security researchers have pointed to cooperation between companies to raise awareness of supply chain attacks. The source code of a…