I used to sit in meetings where clients, often who were in marketing or a creative activity, who happily tell me “Macs don’t get viruses”. Well that was in the days when the handful of creatives using Macs were not viable targets to the hackers. Roll forward to today where …
The “hidden in plain sight” cyber attack
Steganography When we were looking at steganography cyber attacks – hiding malicious code inside for instance image files – I was surprised just how much malware could be hidden without degrading the image. Here is a real-world example of this rare type if attack, spy are code embedded in a …
Do you operate an Exchange Server? Is it patched and up to date?
There is an actively exploited zero-day flaw being reported, that Microsoft has not yet patched – so have a look at GTSC’s blog post: Warning: New attack campaign utilized a new 0-day RCE vulnerability on Microsoft Exchange Server | GTSC (gteltsc.vn) The post also includes some temporary mitigation whilst waiting …
Continue reading “Do you operate an Exchange Server? Is it patched and up to date?”
Here is some of the open-source software I use – and it has all been targeted!
PuTTY, KiTTY and Sumatra PDF Reader – I did my due diligence before installing these – and now they have been targeted by ZINC, a state-sponsored group operating out of North Korea. ZINC weaponizing open-source software – Microsoft Security Blog Before writing this blog post I had checked my system …
Continue reading “Here is some of the open-source software I use – and it has all been targeted!”
VPNs are an important part of any cyber security plan
The moment you step outside your secure office and want to work – or you need anonymity on the internet – a VPN is your go to solution for privacy and security. I have written an article for the blog on our cyber awareness and online training site CyberAwake looking …
Continue reading “VPNs are an important part of any cyber security plan”
