This is a continuation of last week’s article that looked at stealth malware infection from a malicious phishing email. Phishing Emails I spend a lot of my time writing and talking about malicious phishing emails. It is the easiest attack vector into your organisation that a threat actor has access …
Extortion Ransomware
I have a couple of articles over on CyberAwake looking at the issue of extortion ransomware and offering some tips for small and medium organisations on how to protect their information using tools they already have. From Encryption Ransomware To Extortion Ransomware Part I From Encryption Ransomware to Extortion Ransomware …
Apple – patch everything
This includes some older iPhones and iPads – with iOS 15 and 16 and iPadOS 15 and 16 getting updates – and the Studio Display: Apple Updates Everything – SANS Get them done. Not sure you need to do this? Here is an example of a data stealer specifically aimed …
Snipping tool data leak fixed
Here is a follow-up to last week’s Microsoft Snipping Tool story about potential data leaks after an image was cropped – a patch! Microsoft pushes OOB security updates for Windows Snipping tool flaw (bleepingcomputer.com) The out-of-band (OOB) patch is available now – if you – or someone in your company …
Scamming the Hackers
Here is a good news cyber security story: UK National Crime Agency reveals it ran fake DDoS-for-hire sites to collect users’ data (therecord.media) When enquiring about buying distributed denial of service attacks, the hackers were duped into giving their information to law enforcement. An excellent example of social engineering – …
