Theft via Instagram – just promise something “to good to be true”

Social Engineering and Email Cyber Security Training

Nothing complicated about this – a simple scam, abusing people’s trust to net $3m. Send a message, pretend to be someone you are not, provide a malicious link and promise the victim something “free”. Crooks steal NFTs ‘worth $3m’ in Bored Ape Yacht Club heist • The Register It could …

CISA adds several Windows vulnerabilities to the ” Known Exploited Vulnerabilities Catalogue”

software patches are essential cybersecurity

The US Government, Cybersecurity and Infrastructure Security Agency (CISA) has added several new Microsoft Windows, vulnerabilities to it’s database. These all need patches – so again it is a good time to check that your “auto-updating” is working or time to get an Octagon IT monitoring package and let experts monitor the …

Bug bounties are a vendor’s shortcut to software vulnerabilities – UPDATED 26 April 2022

This post was first published on 19 April 2022 Following up on the article below, here is a real world example of bug bounties working to improve cybersecurity. The US Government’s Department of Homeland Security (DHS) worked with a group of cyber security analysts, who uncovered 122 vulnerabilities in the …

Anatomy of a phishing email attachment – this is why we are always running training

Social Engineering and Email Cyber Security Training

SANS Internet Storm Centre has a couple of blog posts looking at the mechanics of a Word document and a PDF both of which are malicious payloads in a phishing email. This is what you are up against! Analyzing a Phishing Word Document – SANS Internet Storm Centre Simple PDF …