For a successful ransomware attack the threat actors have to get their malware onto a user’s computer inside the secure network. Posing as your IT support is one way to get in: Ransomware gangs pose as IT support in Microsoft Teams phishing attacks – BleepingComputer Social Engineering In this attack …
“I have a Mac – I’m secure!”
I am sure I am not alone in having heard this one from clients in the past. It was not true then and fortunately now Mac users now they are at as much risk of a cyber attack as a Windows, Linux, Android, etc. user. This malware attack uses a …
Things do wear out…
We have been working over the last few years to move all of our clients from Microsoft Exchange 2016 and 2019 servers onto more modern and hopefully more secure platforms. Once Microsoft stops cyber security support for these servers, the threat actors will attack any that are still online. Microsoft: …
Because It’s Friday – Bang!
Following on from last week’s amazing, let’s start this week’s “Because It’s Friday” with a YouTube short: Bang! Are you watching The Traitors? We are, although it drives me mad! In this season one of the contestants is faking a Welsh accent in an attempt to be “trusted more” and …
Threat Actors want your Microsoft 365 Credentials
Many of my cyber security investigations have involve the compromise of Microsoft 365 credentials. These are a valuable commodity for threat actors, as a carelessly managed set of credentials may give them the keys to raid your information. The latest attack on M365 credentials, in the tech news, is a …
Continue reading “Threat Actors want your Microsoft 365 Credentials”