Following the discovery of a coding flaw in the ESXiArgs Ransomware, the US government Cybersecurity and Infrastructure Security Agency (CISA) and the FBI have released a document outlining how to use the various scripts and processes to recovery data after an attack: CISA and FBI Release ESXiArgs Ransomware Recovery Guidance …
QakNote – OneNote malware now has name
I use OneNote a lot – so I had to follow up on my previous post about OneNote attachments being used as an attack vector. OneNote has become the threat actors new choice of attachment probably because Microsoft closed the door on macro attacks. In the wild, Microsoft OneNote’ .one’ …
Another UK business has customer data stolen
This time it is the car retailer Arnold Clarke: Arnold Clark customer data ‘stolen in cyber attack’ – BBC News The data theft includes valuable ID information – copies of such documents as passports and driving licenses – as well as financial and personal data, all highly valued by threat …
Continue reading “Another UK business has customer data stolen”
Practice Drinking Coffee* better known as Planning and Preparation
Sorry, this is not a coffee* appreciation article it is an article about planning and preparation for an incident. Planning and Preparation = Good Governance Businesses and organisations need a cyber security policy and a plan covering what they do to mitigate the risk of an incident and what they …
Continue reading “Practice Drinking Coffee* better known as Planning and Preparation”
When government ministers gets involved…
It has emerged, during a session of the Joint Committee on the National Security Strategy (JCNSS), that a government minister instructed Redcar and Cleveland Borough Council to keep secret the extent of a ransomware attack in January 2020. This pressure for secrecy caused problems for the council when it come …