Multi-factor Authentication – MFA – if you are unsure how this cyber security tool contributes to your security, then have a read of this: If you do know how important MFA is, then you will realise that a fake MFA app would cyber security chaos. Of course, the threat actors …
What’s in your email?
This article started life in couple of ways. Over on CyberAwake I re-ran an article from summer 2022, looking at how some information, useful to a threat actor, could leak out of your organisation this summer, just because of the use of a simple setting in Outlook: The Out-Of-Office Email …
Lost nearly everything!
I was reading about the hack of the international telecoms giant AT&T last week, but I noticed the headline of this article about it on the BBC today, that clearly sums up the hack. Hackers steal call records of ‘nearly all’ AT&T customers – BBC It is the ‘nearly all’ …
Encryption
For today’s Wednesday Bit, I want to rerun an article I first published in November last year. I was reminded about my article on encryption for two reasons… One of my current IT and Cyber Security Audits has highlighted an issue where very sensitive information is being shared in a …
Threat actors treat their crimes as a business
It is “old news” but threat actors are usually only in it for the money. Consequently to maximise their profits they turn to the tactics of legitimate businesses, with mission statements, support teams, easy terms and now rebranding! SEXi ransomware rebrands to APT INC, continues VMware ESXi attacks – BleepingComputer …
Continue reading “Threat actors treat their crimes as a business”