This research by Okta highlights the issue of users recycling passwords: Okta: Credential stuffing accounts for 34% of all login attempts (bleepingcomputer.com) There were more login attempts by threat actors than legitimate ones! They were just trying out passwords to see if someone was stupid, (sorry if you do not …
Security updates for Mozilla and Microsoft Products
US Cybersecurity and Infrastructure Security Agency has issued advisories for various security updates: Microsoft Releases Out-of-Band Security Update for Microsoft Endpoint Configuration Manager | CISA Mozilla Releases Security Updates for Firefox, Firefox ESR, and Thunderbird | CISA
If there is way for threat actors to abuse legitimate tools, of course they do it! No, it is not deja vu!
The headline equally applies to the abuse of LinkedIn Smart Links: LinkedIn Smart Links abused in evasive email phishing attacks (bleepingcomputer.com) This is a feature in the LinkedIn Sales Navigator and Enterprise versions and allows packages of documents to be sent out and the metrics for the documents can be …
Do you have a policy to securely dispose of your redundant equipment?
Or do you let your staff or IT Support sell it on eBay? $35M fine for Morgan Stanley after unencrypted, unwiped hard drives are auctioned | Ars Technica We do not resell equipment we are charged with disposing of securely.
If there is way for threat actors to abuse legitimate tools, of course they do it!
Google’s Tag Manager (GTM) is a system for managing HTML and Javascript analytic tags on website, especially ecommerce sites. A report by The Recorded Future has found that threat actors have been installing malicious e-skimmers scripts that can steal customer card data and other personally identifiable information exploiting GTM. Google …
