… more about extortion ransomware and what you can do about defending your information from it: From Encryption Ransomware To Extortion Ransomware Part I – CyberAwake This first part looks at defending critical accounts from compromise.
Extortion only – no encryption
Ransomware is known for encrypting your data then demanding money for the key to recover your information (probably). Then ransomware moved on to not only encrypting but stealing your information and then extorting another ransom from you to not release or sell your information. Now there is ransomware that skips …
OneNote – the threat actors new best friend…
Once it had been discovered how straightforward it is to obscure a malicious package inside a OneNote .one attachment and mixed with “something new”, that users may not have seen before, it was obvious that the use of .one attachments for the delivery of malware was going to go up. …
Continue reading “OneNote – the threat actors new best friend…”
The thefts have started – The SVB collapse…
Following my article earlier this week to warn you to be on the look out for scams – theft attempts – based around the collapse of the Silicon Valley Bank (SVB), Bleeping Computer is reporting that the cybercriminals are actively exploiting the situation looking to steal money and data: Cybercriminals …
Continue reading “The thefts have started – The SVB collapse…”
Patch Tuesday
Yesterday was Patch Tuesday – so get ready for your Windows PC to ask you to rebbot your machine – even though you are in the middle of a job – read about that here. What is fixed this month? The headlines are- as it is every month – this …