The BPFdoor malware has been undetected in the wild for more than five years – infecting Linux and Solaris systems. The malware can give remote access to the shell and complete control to a compromised system. BPFdoor: Stealthy Linux malware bypasses firewalls for remote access (bleepingcomputer.com) The twist with this …
Life cycle of a vulnerability
I spend a lot of time with clients, in training courses and on this blog, explaining the significance of the “zero day” issue and how every organisation (and individual) needs to have a plan to deal with it. This post from SANS Internet Storm looks at the life cycle of …
“We will pay if hit by ransomware again”
If the ransomware gangs keep making large sums of money – easily – from attacking businesses, then they will continue sending out those phishing emails to organisations all round the world. Statistics like these do not help any of us: Most organizations hit by ransomware would pay if hit again …
Anatomy of a WordPress hack
We have a WordPress protocol that we enact with cyber security clients, the hosting clients who buy into the full support package and it comes as part of the “Be the Best Consultant You Can website package“. It is needed as WordPress sites are very prolific and so they are …
The wrong Lincoln College closes
I saw the news last week that Lincoln College had closed because of cyber attacks – I was obviously attracted to the story as we live near to Lincoln, here in the UK, but it was not that Lincoln College. Because of my teaching commitments the story of the US …