Regular readers know that I use the US government Cybersecurity and Infrastructure Security Agency (CISA) website as a reliable source of information on software and hardware vulnerabilities. Ones that impact the organisations we support are escalated to our support team, then I write about those and the rest here, for …
Ransomware and the Phishing Email
There has been some very high profile international cases of organisations getting infected with ransomware. Especially active is the LockBit gang. LockBit ransomware infection hits Japan’s top cargo port • The Register TSMC says IT supplier extorted by LockBit • The Register We should assume these organisations – a world …
So you are technically smart…
…it doesn’t mean you cannot be a cyber crime victim. Putting you under-pressure or approaching you when you are under stress is a classic way threat actors successfully exploit their victims. Here is an example on the BBC of such an attack: The robotic falcon maker who lost £100,000 to …
The anatomy of a spear phishing attack
A spear phishing attack is a malicious email (usually) with content aimed to exploit the specific recipient. Yee Ching Tok, over on SANS Internet Storm has an excellent article taking apart a spear phishing email targeting YouTube content creators. Analyzing a YouTube Sponsorship Phishing Mail and Malware Targeting Content Creators …
