It was yesterday and along with Microsoft other vendors also released patches and updates. You – or the people responsible for your cyber security – need to check what releases impact you and get the patching done. May 2023 Security Updates – Release Notes – Security Update Guide – Microsoft …
The simple attacks often work
Whenever Clive attends a marketing seminar he is often told about the advantages of using a QR to get his message out there. It is true that QR codes are very useful but of course threat actors exploit our trust of them: QR codes used in fake parking tickets, surveys …
Tackling Push Bombing
Multi-factor authentication stands between you and a threat actor gaining access to your services – but the attackers have come up with a simple way to subvert it. Just keep bombarding you with authentication requests until you either give in or make a mistake. If the hacker has your correct …
International Disruption of Threat Infrastructure
International co-operation and excellent police work can have an impact on cyber security threats large and small. Here is an example of the FBI and US Justice Department closing and seizing domains associated with international DDoS attacks. Feds seize 13 more DDoS-for-hire platforms in ongoing international crackdown | Ars Technica …
Continue reading “International Disruption of Threat Infrastructure”
CyberAwake – Incident Follow-up
CyberAwake has published a follow-up article to my previous article on Cyber Security Culture. It looks at what you need to think about when it comes to the meetings following an incident: Cyber Security Incident Follow-up Meetings – (cyberawake.co.uk) How you approach these meeting can have a huge impact on …
