For a successful ransomware attack the threat actors have to get their malware onto a user’s computer inside the secure network. Posing as your IT support is one way to get in: Ransomware gangs pose as IT support in Microsoft Teams phishing attacks – BleepingComputer Social Engineering In this attack …
“I have a Mac – I’m secure!”
I am sure I am not alone in having heard this one from clients in the past. It was not true then and fortunately now Mac users now they are at as much risk of a cyber attack as a Windows, Linux, Android, etc. user. This malware attack uses a …
Email Encryption
Today’s Wednesday Bit is a guest article by Martin from Octagon Technology, looking at email encryption and Microsoft 365. Ever thought about why you would need to encrypt an email? Well here is a scenario. If I am sending an email that has proprietary information in it and I don’t …
Things do wear out…
We have been working over the last few years to move all of our clients from Microsoft Exchange 2016 and 2019 servers onto more modern and hopefully more secure platforms. Once Microsoft stops cyber security support for these servers, the threat actors will attack any that are still online. Microsoft: …
Threat Actors want your Microsoft 365 Credentials
Many of my cyber security investigations have involve the compromise of Microsoft 365 credentials. These are a valuable commodity for threat actors, as a carelessly managed set of credentials may give them the keys to raid your information. The latest attack on M365 credentials, in the tech news, is a …
Continue reading “Threat Actors want your Microsoft 365 Credentials”