I recently wrote a mini-series of articles looking at various aspects of ransomware and what you need to do about it. Ransomware – A Primer – Smart Thinking Solutions That series mainly concentrated on encryption ransomware but the cyber gangs are also turning to extortion ransomware – so I wrote …
Available for sale – a toolkit to steal credentials
AlienFox is a malicious modular toolkit that threat actors can buy via a private Telegram channel. New AlienFox toolkit steals credentials for 18 cloud services (bleepingcomputer.com) The malware can be configured to scan for misconfigured servers and steal authentication details and credentials for a range of popular cloud-based services such …
Continue reading “Available for sale – a toolkit to steal credentials”
Extortion Ransomware
I have a couple of articles over on CyberAwake looking at the issue of extortion ransomware and offering some tips for small and medium organisations on how to protect their information using tools they already have. From Encryption Ransomware To Extortion Ransomware Part I From Encryption Ransomware to Extortion Ransomware …
Windows 11 to get extra phishing protection
This is only being released to the Windows Insider programme at the moment but if it is will get to the general release soon. Windows 11 gets phishing protection boost and SHA-3 support (bleepingcomputer.com) It is designed to protect your credentials, alerting you if you are about to carry out …
Continue reading “Windows 11 to get extra phishing protection”
WordPress WooCommerce security issue
Keeping up with WordPress plugin security is something our web manager works very hard at for us and our clients – it is important. Read this to find out why: What do you know about your website? – CyberAwake As you can see this issue escalates when personal information and …
Infected and you didn’t even know it…
When I am delivering the cyber awareness training – and people relax, realising I really mean it when I say there are no stupid questions – I often get asked “how do I know if my computer was infected?”. Usually just before being asked about the length of a piece …
As promised yesterday…
… more about extortion ransomware and what you can do about defending your information from it: From Encryption Ransomware To Extortion Ransomware Part I – CyberAwake This first part looks at defending critical accounts from compromise.