Having read Ben’s article on Phishing Email, this morning, before posting it to Smart Thinking as part of my Back-to-Basics Email Phishing Primer, I was reminded of a Bruce Schneier article and associated research paper I read last week – looking at how anyone can end up following a misleading …
Email Phishing Primer
We have a guest writer for the next part of the Email Phishing Primer. Ben one of the support team at Octagon Technology has written about this cyber security threat from his point of view as someone who must advise clients on this issue on a day-to-day basis. Part eight …
Going back in time…
This post is about one of my articles from 2023, which having just started on an IT and Cyber Security Audit for an organisation, I realised was relevant to the new project. All the board members and senior managers got a link to this article: Cyber Security The Layer Cake …
Phishing Attacks – It is in the numbers. (pt 6)
I think we have established two key points in previous articles in this Back-to-Basics, Email Phishing Primer: 1 – Threat actors’ primary motivation for sending out phishing emails is financial. 2 – One of the best tactics any organisation can use to defend against phishing attacks is cyber security awareness …
Continue reading “Phishing Attacks – It is in the numbers. (pt 6)”
Credentials are King
Threat actors are always looking for good sources of valid (stolen) email and password combinations – and there are many hundreds of millions available to them. 361 million stolen accounts leaked on Telegram added to HIBP (bleepingcomputer.com) Once they have these credentials, the threat actors will be trying them out …