Yesterday I published my latest article over on our online training site CyberAwake looking at the most basic of cyber-attacks – an infected phishing email. Don’t be tempted to open that zip file A story of a phishing email – CyberAwake Could you people deal with this situation? QBot Malware: …
The supply chain is complicated – which is why it is vulnerable to exploitation
Bruse Schneier has an interesting article out today, describing how a Russian company that produces code that is included in thousands of smartphone apps, both iOS and Android, masquerades as an US company. Russian Software Company Pretending to Be American – Schneier on Security There is no suggestion of wrong …
Continue reading “The supply chain is complicated – which is why it is vulnerable to exploitation”
Cyber Attacks on Multi-factor authentication
My article on one of the methods used by threat actors to erode our faith in multi-factor authentication (MFA) was published over on CyberAwake yesterday: More on MFA and your risks when using it – CyberAwake
CISA adds a Microsoft vulnerability to the Known Exploited Vulnerabilities Catalog
The US government Cybersecurity and Infrastructure Security Agency (CISA) has added a Microsoft Windows flaw to the Known Exploited Vulnerabilities Catalog. CISA Has Added One Known Exploited Vulnerability to Catalog    | CISA
YOU WILL NOT PAY THAT RANSOMWARE DEMAND!
Australia has been in the cyber security headlines recently with a couple of high-profile hacks that has seriously impacted millions of citizens: Now it is being reported that the Australian government is considering bringing in legislation to prevent organisations legally paying ransomware demands, in an attempt to disrupt the threat …
