CISA Has Added One Known Exploited Vulnerability to Catalog | CISA
Do not be deceived by fake Zoom sites
Before downloading any Zoom apps, make sure you are on a legitimate site. Threat actors have created fake malicious sites, that do not provide Zoom apps but instead download Vidar Stealer, information stealing malware. Fake sites fool Zoom users into downloading deadly code • The Register This malware will exfiltrate …
Ransomware the threat and the attacks – you need to make sure your cyber security game is up to the job of protecting your organisation.
As you have read ransomware has been in the news for because one of the major ransomware gangs, BlackCat/ALPHV updated and expanded its capability to carry out the double extortion tactic and because another major ransomware player LockBit suffered an insider attack of its own: The threat actors are also …
Microsoft Teams is keeping security tokens in plain text… and more UPDATED 23 September 2022
The original post was published on 16 September 2022 This is a real problem, no software or system should keep any security token in plain text, any time during operation. The user base for Microsoft Teams is in excess of 270 million users – we are part of that number …
Because It’s Friday – Queen Elizabeth II and Technology
Because it does not always need to be serious cyber security articles. Get your coffee and doughnuts out. Here are a couple of articles about Queen Elizabeth II and her relationship with technology. How the Queen embraced technology during her reign | Queen Elizabeth II | The Guardian Queen Elizabeth …
Continue reading “Because It’s Friday – Queen Elizabeth II and Technology”
