The story normally is “hackers place malicious code into legitimate projects on software repository”. This is a favourite threat actor tactic as it can infect many users, when software developers, unintentional, distribute the malicious code with their projects. Code Risk This story however is how threat actors are using these …
Information Security in the Office (pt.3)
This is part 3 of a short series looking at information security in the office – here are links to part 1 and 2. Information Security in the Office (pt.1) The Printer is the Issue Information Security in the Office (pt.2) Forgotten Technology Today we are going to look at …
Continue reading “Information Security in the Office (pt.3)”
Microsoft Patch Tuesday – September 2024
It is here again – the second Tuesday of the month, Microsoft Patch Tuesday. Remember though other vendors also release cyber security and functionality updates and patches on or around the same time. Our support team have been reviewing our client monitoring reports and the SOC to check that the Microsoft Patch …
Continue reading “Microsoft Patch Tuesday – September 2024”
Ransomware has not gone away
Just in case you thought that ransomware was a thing of the past or that the threat actors only went after big businesses, then think again: NoName ransomware gang deploying RansomHub malware in recent attacks (bleepingcomputer.com) The NoName ransomware gang has been targeting small and medium-sized businesses worldwide with its …
Forced Upgrades
It is nothing new for me to say that patches and upgrades are an essential step in any organisation’s cyber security plan. Threat actors actively go after any system that has a weakness as soon as they know about it – many times before a vendor even knows there is …
