I have published an article over on our online training site, CyberAwake, that looks at how businesses can leak what appears to be insignificant information, that a hacker can collect and assemble into a picture that can comprise your cyber security: The Basics of Cyber Security – A quick look …
Do you keep your passwords in LastPass?
Then you should be aware of this – they have suffered a follow up cyber security incident, using information from an incident in August, that breached their security again: Lastpass says hackers accessed customer data in new breach (bleepingcomputer.com) An investigation has revealed no customer encrypted passwords were compromised. I …
Google action to protect small businesses
Google is recognising the impact its services have on the success of smaller businesses, and how scammers are taking advantage to exploit those same businesses. The article covers the legal actions Google has taken; the scams that are being run in its name and advice on how to deal with …
Continue reading “Google action to protect small businesses”
How gift cards enable monetise cyber-attacks
I published an article yesterday on CyberAwake looking at how gift cards are misused by threat actors: How Gift Cards are exploited by Cyber Criminals – CyberAwake
Threat actors are always on the lookout for ways to get to you
So a new trend going viral on a social media platform is an ideal place to interfere with and use to spread malware. Just like the “Invisible Body” challenge on TikTok: TikTok ‘Invisible Body’ challenge exploited to push malware (bleepingcomputer.com) Do not be deceived by the offer from the hackers …
Continue reading “Threat actors are always on the lookout for ways to get to you”