Once it required a level of technical skill, practice and hardware resources to carry out successful cyber attack that would make (illicit) money. Now researchers have discovered and easy to use framework that enables any would be hacker to craft sophisticated attacks, deploy them, steal information and monetise them: New …
Yesterday was Patch Tuesday for Microsoft
So, everyone knows what that means, for the users, slow internet connections as we all gather in those vital updates, for the administrators, checking what needs to be done and checking that it has happened – including checking that the users have not skipped the updates because they are too …
Continue reading “Yesterday was Patch Tuesday for Microsoft”
Why do I write so much about Social Engineering and Phishing Attacks?
Because for the effort the threat actors put in, the returns can be very high, so it is worth their while sending out billions of malicious messages to see who they can catch. It could be you… Now in the age of online “as-s-service” software, it has become even easier …
Continue reading “Why do I write so much about Social Engineering and Phishing Attacks?”
Intel BIOS source code has been stolen
Intel has confirmed that the leaked BIOS code on GitHub is the code for the UEFI BIOS of Alder Lake CPUs. Intel confirms leaked Alder Lake BIOS Source Code is authentic (bleepingcomputer.com) Intel has been talking down the security implications of the leak, however the release of the code will …
A new approach that is bad for us…
Threat actors have developed a new approach to malware that exploits legitimate drivers making it more difficult to defend against the malware. To date over 1000 drivers have been impacted: BlackByte ransomware abuses legit driver to disable security products (bleepingcomputer.com) What makes this “Bring Your Own Vulnerable Driver” (BYOVD) method …