This is an article looking at the invisible threat in our hardware – UEFI rootkit attacks. Discovery of new UEFI rootkit exposes an ugly truth: The attacks are invisible to us | Ars Technica
Advice from the National Cyber Security Centre and the UK Government – actions to take when the cybersecurity risk is high (Russia Ukraine Conflict) – UPDATED 2 May 2023
This post was originally made on 2 March 2022. It will be updated as the Russian Ukraine Conflict develops and will highlight the cyber security issues facing organisations and individuals at this time. The National Cyber Security Centre (NCSC) is advising all UK organisations to review and improve their cyber …
Zero-day targeted attack against journalists using Google Chrome
This attack was highly targeted, using spyware from an Israeli cyber weapons company Candiru. To get the spyware onto the target machines the threat actors exploited, what was then, a zero-day vulnerability in Google Chrome. Zero-day used to infect Chrome users could pose threat to Edge and Safari users, too …
Continue reading “Zero-day targeted attack against journalists using Google Chrome”
Industrial systems as targets for threat actors – this why you need a software policy. Do you have one?
Industrial systems, large and small run on computers – so why not attack them? So here is the scenario – which Octagon has had to deal with in the past – someone leaves and forgets to leave the password for a system that is accessed only occasionally. You cannot contact …
More and more phishing attacks – each with their own special touch to exploit the trust of your people!
A UK Government’s report looking at cybersecurity breaches across the country, (UK Government. 2022), prepared by Department for Digital, Culture, Media & Sport (and sport!) showed clearly email phishing is a real threat: “Of the 39% of UK businesses who identified an attack, the most common threat vector was phishing …