If you read the above headline and know your company has an online shop, but you are unsure what platform your website managers are using, or even who has the responsibility for the cyber security of that website, then you have an even bigger problem. If your customer’s personal information …
Windows Calculator as an attack vector
Threat actors have to find a way to get their malware onto your systems – phishing emails is an obvious method – Qakbot malware is the next step. This malware also known as Qbot, has been found to be to be intermediate software used by threat actors to infect victim’s …
Really big numbers when it comes to leaking user’s personal data
One of the earliest posts on Smart Thinking was about Twitter being hacked: Twitter hack – Smart Thinking Solutions Now here we are again. What appears to be a lone threat actor, got inside their systems, with enough time to exfiltrate a substantial amount of Twitter user personal information. This …
Continue reading “Really big numbers when it comes to leaking user’s personal data”
It all starts with a phishing email
In most of our business cyber security training and work, we eventually get to the question of how cyber security defences are breached – and most often the answer is, using email. Even the biggest cyber criminal gangs attacking the highest profile targets, just use email. North Korean hackers attack …
The “Swiss Army Knife” of Linux malware
Plug-ins is a way of vendors and third-parties extending the functionality of software – it work very well, the success of WordPress is partly based on plug-ins. Now the threat actor vendors are taking the same approach with their malware – with the plug-ins helping to obfuscate the malware to …