Anatomy of a phishing email attachment – this is why we are always running training

Social Engineering and Email Cyber Security Training

SANS Internet Storm Centre has a couple of blog posts looking at the mechanics of a Word document and a PDF both of which are malicious payloads in a phishing email. This is what you are up against! Analyzing a Phishing Word Document – SANS Internet Storm Centre Simple PDF …

When you improve your defences – the hackers change their tactics

Patches and Updates

Following up on the two articles I posted yesterday, to give you an awareness of the threat landscape, here are two articles discussing how that landscape is constantly changing. Criminals adopting new methods to bypass improved defenses • The Register Cybercriminals are finding new ways to target cloud environments | …

Java vulnerabilities to look out for – Spring4Shell – UPDATE 23 April 2022

This story was first published on 31 March 2022 and Updated on 5 April 2022 Update 26 April 2022 There has been a steady increase in the number of active attacks against this and related vulnerabilities: Hackers hammer SpringShell vulnerability in attempt to install cryptominers | Ars Technica This is …

Why you need to look at your cybersecurity risks and mitigations

Here are a couple of longer articles, that give you some idea into the scale of cyber security and information security responsibilities, owners, directors and senior managers face in the current threat landscape. Over 42 million people in the UK had financial data compromised | TechRepublic Report: Many SMBs wouldn’t …