Java vulnerabilities to look out for – Spring4Shell – UPDATE 23 April 2022

This story was first published on 31 March 2022 and Updated on 5 April 2022 Update 26 April 2022 There has been a steady increase in the number of active attacks against this and related vulnerabilities: Hackers hammer SpringShell vulnerability in attempt to install cryptominers | Ars Technica This is …

Why you need to look at your cybersecurity risks and mitigations

Here are a couple of longer articles, that give you some idea into the scale of cyber security and information security responsibilities, owners, directors and senior managers face in the current threat landscape. Over 42 million people in the UK had financial data compromised | TechRepublic Report: Many SMBs wouldn’t …

BlackCat ransomware tracked to at least 60 victims

This was the ransomware that hit universities over the past weeks: Universities as targets – Smart Thinking Solutions The FBI has released a statement outlining other attacks of BlackCat ALPHV and the attack vectors and strategies the gang has been using. It includes suggested mitigation. BlackCat/ALPHV Ransomware Indicators of Compromise …

Yes people do track a top ten for malware. Do you want to know what the #1 is?

It’s Emotet – this is obviously where the cyber-criminals are making their money. Emotet reestablishes itself at the top of the malware world • The Register Emotet is operated by an operation called Cryptolaemus, and they have been developing the code to bring the malware back after it had been …

US Government offers a reward for information about North Korea illegal cyber activities UPDATED 21 April 2022

This post was originally posted on 19 April 2022 The US Government has offered a reward of up to $5m for information that disrupts North Korean cyber-attack activity . North Korea Rewards For Justice (US Government) U.S. offers $5 million for info on North Korean cyber operators – The Record …