I found this article very interesting – if you have time over the weekend, with a tea, coffee or wine, have a read you might enjoy it too. Inside Conti leaks: The Panama Papers of ransomware – The Record by Recorded Future …and there is more. Leaked Conti files reveal …
Israeli government websites disrupted
I have written recently about the increase in distributed denial-of-service (DDoS) attacks – here is a real world example of the effectiveness of these new massive attacks: Israeli govt sites hit by huge DDoS attack • The Register
Mobile phone malware – a researcher’s point of view and in the wild
Here is some timely advice from TechRepublic about mobile device cyber security: Mobile malware is on the rise: Know how to protect yourself from a virus or stolen data | TechRepublic The big takeaway is sideloading of apps, that have not been approved by an approved app store or repository, …
Continue reading “Mobile phone malware – a researcher’s point of view and in the wild”
Anatomy of a malicious email – what you should be looking out for
Brad Duncan has a very good article, with an example of the phishing email and infected package on SANS Internet Storm Centre today. Qakbot infection with Cobalt Strike and VNC activity – SANS Internet Storm Centre Being familiar with these types of phishing email is your organisation’s best defence. At …
Continue reading “Anatomy of a malicious email – what you should be looking out for”
Maybe the storm is here?
Having, last week, written about the lull before the storm, if the Ukraine Russia cyber conflict spills outside their borders: There may be evidence that it has started to happen, with the German office of the Russian oil company Rosneft reporting a cyber security breach: Viasat, Rosneft hit by cyberattacks …