OpenDocument files distributing stealth malware – make sure your team can recognise these types of attack.

This report is from HP’s Threat Research Blog and is about a threat discovered impacting hotels in South America. But it illustrates the wide range of threats that can get to you via an email attachment and has some examples you can look at. Stealthy OpenDocument Malware Deployed Against Latin …

H0lyGh0st ransomware targets small and medium businesses

Ransomware extortion

This is a longer read from the Microsoft Security Blog and the Microsoft Threat Intelligence Center (MSTIC) and it illustrates that all businesses and organisations regardless of size or ability to pay are in the threat actor’s sights: North Korean threat actor targets small and midsize businesses with H0lyGh0st ransomware …

Because It’s Friday – A guide to computer terms from 1981 and good advice for computer users in 2022

Radio Shack comic cover

Who remembers Tandy, the electronics store? There was one in the Grays shopping centre, when I was kid, as there were in many other towns around the country, and I bought stuff from them. Although the free battery card never really did work out. Radio Shack was the US parent …

Ransomware victims in a searchable database for threat actors to access!

It gives the threat actors a chance to check on victim’s exploited vulnerabilities, see who pays when infected by ransomware and other useful bits of information if you plan to maximise your cyber criminal profits. Experts concerned about ransomware groups creating searchable databases of victim data – The Record by …