Time to add another chapter to my Phishing Email Primer: It is being reported that threat actors have been using a new targeting tactic to sort through victims who have been ensnared by their social engineering attacks. When presented with the malicious credentials Window, only those high-value victims who have …
To Catch A Thief… A Story of a Security Operations Centre
I am sorry, the title is a bit misleading, but once you have read the article, I am sure you will see how we – and the Security Operations Centre – could have caught a thief. Additionally, it is not about the Hitchcock movie; however, some of the action does …
Continue reading “To Catch A Thief… A Story of a Security Operations Centre”
Microsoft Patch Tuesday – April 2025
Yesterday was the second Tuesday of the month, Microsoft Patch Tuesday. The day the cyber security world thinks about Microsoft patches and vulnerabilities. But remember other vendors also release cyber security and functionality updates and patches on or around the same time – check those as well. Our support team …
Delivery Scam – follow up
No, not an explanation from Evri or AliExpress – not that I expected one from either of them following this article: But a useful advice article from the Google blog: Google shares tips to avoid email, phone, text and Search scams Your Takeaway Two things. Photo by Tara Winstead
Simply Phishing
We all hear so much about phishing attacks that it can become just background noise, rather than a risk and threat to our organisations – I am guilty of adding to noise as I regularly write about the various types of phishing attacks. For instance, I wrote a whole Back-to-Basics …