The story normally is “hackers place malicious code into legitimate projects on software repository”. This is a favourite threat actor tactic as it can infect many users, when software developers, unintentional, distribute the malicious code with their projects. Code Risk This story however is how threat actors are using these …
AI on Octagon’s Blog
Martin and Ben have been the editors for this month’s Octagon Technology Newsletter and being geeks and generally interested in technology, they chose AI as their theme. Here are the AI posts we wrote for their newsletter: Copilot AI and the Phishing Email Careful with that A.I. Eugene ! / …
Telling tales
Bruse Schneier has a link to a new patent application that would enable one car to report another car to the authorities for a traffic violation. New Patent Application for Car-to-Car Surveillance – Schneier on Security
Stuck on updates!
I admit I write about updates a lot – but they are important, as illustrated by the chaos caused by CrowdStrike. You cannot live without them and sometimes you cannot live with them. I often use this slide, quoting Bruce Schneier, when I write about updates – you are guaranteed …
Not a cyber security issue but it still needs patching…
Continuing the device theme this week – what happens when those devices we rely fail to work properly because they are missing a patch? If it is your firewall then you have a cyber security issue and you need to contact us for some help. If it is your alarm …
Continue reading “Not a cyber security issue but it still needs patching…”
