Attackers are always looking for new way to get their illicit packages through defences and this research paper outlines how by exploiting Unicode, malicious code can be written into software so that human code reviewers cannot recognise that it is there. Trojan Source: Invisible Vulnerabilities “This work has been under …
National Cyber Security Centre Threat Report
Here is a link to the NCSC weekly threat report for week ending 29/10/2021: Weekly Threat Report – NCSC.GOV.UK
Hallowe’en and maybe the hacker god will return from the dead! – #BeCyberSmart
In 2017 an academic paper1 about printer security highlighted open ports on many different types of printer. The paper was published on Monday 30 January and the following weekend a hacker using the pseudonym Stackoverflowin searched the internet to find vulnerable printers. The hacker then made his way into over …
Continue reading “Hallowe’en and maybe the hacker god will return from the dead! – #BeCyberSmart”
Are you still using RDP? If so examine your risk!
Remote Desktop Protocol (RDP) was very popular, until it’s vulnerabilities came to light. It’s time to disconnect RDP from the internet | WeLiveSecurity Today Sans Internet Storm is reporting an increase in probes being initiated against RDP services – even though it is a well known weak service. Remote Desktop …
Continue reading “Are you still using RDP? If so examine your risk!”
Think you’re secure? Think again. #BeCyberSmart
Thinking you are sufficiently protected against security threats is not good enough. You need to know! Governance and management are a major part of getting security right. How do you measure up? Without the right policies and processes in place and adhered to, you are not truly secure. We can …
Continue reading “Think you’re secure? Think again. #BeCyberSmart”