…which makes them a juicy target for threat actors if they can find a bug in code or plugins. That was the topic of yesterday’s article on CyberAwake: Let’s Talk About WordPress – CyberAwake This is an article about governance – not a technical article – so if you are …
Because It’s Friday – The View from Outer Space
Whist I was in Edinburgh last week at a conference, there was an admin snafu here at Smart Thinking HQ, which meant we did not get a “Because It’s Friday” post out. So unfortunately you were not entertained before the weekend! But I do have something for you this week, …
Continue reading “Because It’s Friday – The View from Outer Space”
Code Supply Chain Compromise
It is a while since I have written about the issue of compromising code in software repositories being an attack vestor for threat actor bit it has not gone away. Malicious Microsoft VSCode extensions steal passwords, open remote shells (bleepingcomputer.com) Software and web developers everywhere will access code from these …
We do not use RDP…
…and neither should you. RDP is Microsoft’s remote desktop protocol and enables a user at one computer to take over a remote computer – you are all familiar with the concept, and I am sure you used it. However the technology is old and full of security holes and no …
The Capita Data Breach
Why does the Capita data breach have something to teach every organisation about cyber security? When a company has many clients for whom they do so many things, it stands to reason that threat actors will take an interest. One breach and the criminals get access to a wide range …
