Big numbers – lots of money – so a prime target for threat actors: Thieves pilfer $100m-plus in cryptocurrency from Harmony.one • The Register It is not the blockchain that is compromised – it is the handling processes that are vulnerable.
How does ransomware get into my system? I’m careful!
Of course the threat actors use social engineering techniques and phishing emails: Fake copyright infringement emails install LockBit ransomware (bleepingcomputer.com) Ransomware is probably the biggest cyber security threat facing businesses today. Coming soon: Five essential skills you need to do your own cybersecurity – A Masterclass Are you facing cyber …
Continue reading “How does ransomware get into my system? I’m careful!”
National Cyber Security Centre Threat Report 24 June 2022
Threat Report 24 June 2022 – NCSC.GOV.UK
Early Lessons from the Ukraine Russia cyber conflict
Brad Smith, President & Vice Chair at Microsoft discusses what has been learnt, so far, from the Ukraine Russia cyber conflict and looks at how this can easily spread beyond the borders of the conflicting nations: Defending Ukraine: Early Lessons from the Cyber War – Microsoft On the Issues
CISA security advisory for Citrix Hypervisor
Citrix has released security updates for it’s software: Citrix Releases Security Updates for Hypervisor | CISA
