Ransomware does not go away and still poses one of the greatest risks to ant organisation large and small. Here is the latest ransomware attack being reported in the tech press: Trigona ransomware spotted in increasing attacks worldwide (bleepingcomputer.com) You at least need to know you have a ransomware resilient …
Google action to protect small businesses
Google is recognising the impact its services have on the success of smaller businesses, and how scammers are taking advantage to exploit those same businesses. The article covers the legal actions Google has taken; the scams that are being run in its name and advice on how to deal with …
Continue reading “Google action to protect small businesses”
How gift cards enable monetise cyber-attacks
I published an article yesterday on CyberAwake looking at how gift cards are misused by threat actors: How Gift Cards are exploited by Cyber Criminals – CyberAwake
Threat actors are always on the lookout for ways to get to you
So a new trend going viral on a social media platform is an ideal place to interfere with and use to spread malware. Just like the “Invisible Body” challenge on TikTok: TikTok ‘Invisible Body’ challenge exploited to push malware (bleepingcomputer.com) Do not be deceived by the offer from the hackers …
Continue reading “Threat actors are always on the lookout for ways to get to you”
CISA adds two vulnerabilities to the Known Exploited Vulnerabilities Catalog
The US government Cybersecurity and Infrastructure Security Agency (CISA) has added advisories for Oracle and Google to the Known Exploited Vulnerabilities Catalog it maintains: CISA Adds Two Known Exploited Vulnerabilities to Catalog | CISA
