Here is a follow-up story to the recent Capita data breach. Capita admits cost of March breach will be up to £20M • The Register Capita is the UK’s largest outsourcing company with the UK armed forces, government and some very large companies as its clients. So the costs of …
ONLY get your Windows updates via the Updates app
We write a lot about patches and updates – they are important to keep your organisation secure. But do not be tempted when browsing the web to follow a helpful advert that offers you Windows updates. That is not how it is done! Fake in-browser Windows updates push Aurora info-stealer …
Continue reading “ONLY get your Windows updates via the Updates app”
The simple attacks often work
Whenever Clive attends a marketing seminar he is often told about the advantages of using a QR to get his message out there. It is true that QR codes are very useful but of course threat actors exploit our trust of them: QR codes used in fake parking tickets, surveys …
Tackling Push Bombing
Multi-factor authentication stands between you and a threat actor gaining access to your services – but the attackers have come up with a simple way to subvert it. Just keep bombarding you with authentication requests until you either give in or make a mistake. If the hacker has your correct …
The Anatomy of a Malicious Word Document
If you want to know what a malicious phishing email and Word document looks like and how it functions, have a read of this article by Xavier Mertens on SANS Internet Strom. Infostealer Embedded in a Word Document – SANS Internet Storm Center It uses a simple technique to get …
