Plug-ins is a way of vendors and third-parties extending the functionality of software – it work very well, the success of WordPress is partly based on plug-ins. Now the threat actor vendors are taking the same approach with their malware – with the plug-ins helping to obfuscate the malware to …
Brute force attacks on Window 11
Disabling risky services for any OS or software “out-of-the-box” is always a good idea. If you need it, then you or your system administrators can enable it. A brute force attack is where a threat actor – or normally a threat actor computer – will try a range of different …
Has the July’s Patch Tuesday broken Access applications? UPDATED 22 July 2022 – there is a fix.
Updated 22 July 2022 Microsoft is addressing this issue: Error when trying to open an ACCDE/MDE file created in a different version of Access (microsoft.com) However other optional updates may impact printing! Original post: Microsoft is investigating reports that applications based on Microsoft Access 2016 and 2013 are failing following …
If you hold a little or a lot of sensitive data in a web app make sure it is secure!
Neopets didn’t and leaked the details of 69 million users, That is a lot of personal information to lose control of! Neopets data breach exposes personal data of 69 million members (bleepingcomputer.com) Their source code and other data was also stolen. A hacker calling themselves ‘TarTarX’ is selling the source …
Ransomware attacks delivered and monetised with little technical knowledge
The model of ransomware attacks has definitely moved for a backroom hackers sending malware out, to a corporation style operation, complete with updates, support and marketing of the illicit tools. Small opportunist threat actors remain, and always will, hackers have to start somewhere, as is shown by this article at …
Continue reading “Ransomware attacks delivered and monetised with little technical knowledge”