This morning, I have released a new blog post on our training site CyberAwake about how to work securely from anywhere. The choice of hot beverage is yours.
Google elite bug bounty program
I have written before about how good “bug bounties” are for improving everyone’s cyber security, rewarding the white hat hackers and researchers for their work. The Open Source Software Vulnerability Rewards Program (OSS VRP) Now Google has launched a bug bounty program that rewards the ethical technologists for finding and …
More on the recent NHS ransomware attack – UPDATED
This post was originally made on the 11 August 2022 Update 31 August 2022 It appears that the cyber attack on NHS software provider, Advanced, is going to take at least 12 weeks more to fix. Leading to information delays and impact on patient care. Advanced cyber-attack: NHS doctors’ paperwork …
Continue reading “More on the recent NHS ransomware attack – UPDATED”
And here is another phishing attack story – have you visited CyberAwake.co.uk yet?
I have just written about this supply chain cyber attack: Developer software repositories will always be a prime target for threat actors – Smart Thinking Solutions And here is another phishing attack hunting for the unwary who will reveal their credentials: DoorDash customer info exposed in Oktapus phishing attack • …
Software repositories are a target for threat actors
If you, as a threat actor, could embed your malware into a software module, that is then used by many innocent and unaware software developers in their packages, they release to the general public, wouldn’t you? That looks like a lot of infected machines for a small amount of work. …
Continue reading “Software repositories are a target for threat actors”
