This report is from HP’s Threat Research Blog and is about a threat discovered impacting hotels in South America. But it illustrates the wide range of threats that can get to you via an email attachment and has some examples you can look at. Stealthy OpenDocument Malware Deployed Against Latin …
H0lyGh0st ransomware targets small and medium businesses
This is a longer read from the Microsoft Security Blog and the Microsoft Threat Intelligence Center (MSTIC) and it illustrates that all businesses and organisations regardless of size or ability to pay are in the threat actor’s sights: North Korean threat actor targets small and midsize businesses with H0lyGh0st ransomware …
Continue reading “H0lyGh0st ransomware targets small and medium businesses”
Anonymous browsing – not anymore
Researchers from the New Jersey Institute of Technology have written a paper, which they will present at the Usenix Security Symposium in Boston, demonstrating how threat actors (or governments or law enforcement) could de-anonymise a users from their browsing habits. The attackers would analyse browsing activity and state to determine …
Because It’s Friday – A guide to computer terms from 1981 and good advice for computer users in 2022
Who remembers Tandy, the electronics store? There was one in the Grays shopping centre, when I was kid, as there were in many other towns around the country, and I bought stuff from them. Although the free battery card never really did work out. Radio Shack was the US parent …
Ransomware victims in a searchable database for threat actors to access!
It gives the threat actors a chance to check on victim’s exploited vulnerabilities, see who pays when infected by ransomware and other useful bits of information if you plan to maximise your cyber criminal profits. Experts concerned about ransomware groups creating searchable databases of victim data – The Record by …
Continue reading “Ransomware victims in a searchable database for threat actors to access!”
