If you want to know what a malicious phishing email and Word document looks like and how it functions, have a read of this article by Xavier Mertens on SANS Internet Strom. Infostealer Embedded in a Word Document – SANS Internet Storm Center It uses a simple technique to get …
Passwordless Google Accounts
I’m in. I have written about passwordlessness (I probably made that word up!) before. Eliminating the password makes it much harder for threat actors to compromise your security, exploit stolen credentials and gain unauthorised access to systems such as Microsoft and now Google: Google adds passkeys support for passwordless sign-in …
BitLocker for Cyber Security
BitLocker is an often-overlooked cyber security tool provided by Microsoft. Why you should understand BitLocker Oh dear, you have lost your laptop, perhaps it was stolen or maybe you simply threw it away. I hope there was nothing important or sensitive on it! At best you would have coursework or …
Exploited Vulnerabilities
The US government Cybersecurity and Infrastructure Security Agency (CISA) has added TP-Link, Apache and Oracle vulnerabilities to the Known Exploited Vulnerabilities Catalog. CISA Adds Three Known Exploited Vulnerabilities to Catalog | CISA
Ransomware is still the top threat…
Another school has been hit by ransomware. They tend to be soft targets for threat actors as they use a range of predictable applications, their IT teams are not large, IT tends not to be a priority and they have a large group of potential victims for phishing emails etc. …
