In most of our business cyber security training and work, we eventually get to the question of how cyber security defences are breached – and most often the answer is, using email. Even the biggest cyber criminal gangs attacking the highest profile targets, just use email. North Korean hackers attack …
1000 posts and counting
This is the 1000th news feed post here at Smart Thinking, so I was told by Marketing I needed to do something special. I would have simply gone on reporting the stories of the day and giving out advice, making sure you are all provided with a range of cyber …
The “Swiss Army Knife” of Linux malware
Plug-ins is a way of vendors and third-parties extending the functionality of software – it work very well, the success of WordPress is partly based on plug-ins. Now the threat actor vendors are taking the same approach with their malware – with the plug-ins helping to obfuscate the malware to …
National Cyber Security Centre Threat Report 22 July 2022
Threat Report 22nd July 2022 – NCSC.GOV.UK
Transparency
Here is an interesting article from Kent Walker, President of Global Affairs, Google & Alphabet, looking at how Google reached it’s current stance on sharing cybersecurity information. Transparency in the Shadowy World of Cyberattacks (blog.google)