There is a very odd reference in this 1989 article from the BBC Archive comparing using a Walkman to mental illness! But I am sure that is what happens when you turn something so basic into high-brow! It is interesting how the American advert manages to put a hyphen between …
Booking.com phishing attacks
We use Booking.com for our business travel, so this story was going to make the news this week. ClickFix attack delivers infostealers, RATs in fake Booking.com emails This is a long running phishing campaign that is obviously still having success in trapping victims – targeting organisations that use Booking.com for …
Not Forgotten…
Just in case you thought ransomware was done, the US Government Agency, CISA (Cybersecurity and Infrastructure Agency – not closed yet) issued a warning that the Medusa ransomware operation has hit over 300 organisations in February 2025. #StopRansomware: Medusa Ransomware | CISA Your Takeaway I have two things for you: …
Identity Theft (part 1)
Identity theft, as cyber attacks go, is pretty easy to understand – a threat actor gains control of a user’s credentials (identity) and then attacks the service (organisation), posing as that user. There are nuances but that is the attack in the briefest of terms. Credential and identity theft are …
Microsoft Patch Tuesday – March 2025
Today is second Tuesday of the month, Microsoft Patch Tuesday. The day the cyber security world thinks about Microsoft patches and vulnerabilities. But remember other vendors also release cyber security and functionality updates and patches on or around the same time – check those as well. Our support team have …