Bug bounties are a vendor’s shortcut to software vulnerabilities – UPDATED 26 April 2022

This post was first published on 19 April 2022 Following up on the article below, here is a real world example of bug bounties working to improve cybersecurity. The US Government’s Department of Homeland Security (DHS) worked with a group of cyber security analysts, who uncovered 122 vulnerabilities in the …

Anatomy of a phishing email attachment – this is why we are always running training

Social Engineering and Email Cyber Security Training

SANS Internet Storm Centre has a couple of blog posts looking at the mechanics of a Word document and a PDF both of which are malicious payloads in a phishing email. This is what you are up against! Analyzing a Phishing Word Document – SANS Internet Storm Centre Simple PDF …

When you improve your defences – the hackers change their tactics

Patches and Updates

Following up on the two articles I posted yesterday, to give you an awareness of the threat landscape, here are two articles discussing how that landscape is constantly changing. Criminals adopting new methods to bypass improved defenses • The Register Cybercriminals are finding new ways to target cloud environments | …