I have written a lot about the fact that many cyber attacks include an element of social engineering, to tease the victim into lowering their guard and doing what the threat actor wants. Here is an excellent example of that, described by Xavier Mertens on SANS Internet Storm, where the …
Ransomware Mini-Series (2023)
Part 7 of my Ransomware Mini-series has been published today: You and a Ransomware Resilient Back-up – CyberAwake Here are the previous parts if you missed them: Ransomware Mini-Series (2023) Ransomware: Is it a Threat? (Part 1) A Bag of Spanners – Planning and Preparation (Part 2) Minimise the Damage …
Twitter saving money but improving your security
If you are using SMS to authenticate your Twitter you will need to switch to another authentication method before 20 March 2023 as Twitter is going to turn the service to save itself $60m. Twitter gets rid of SMS 2FA for non-Blue members — What you need to do (bleepingcomputer.com) …
Continue reading “Twitter saving money but improving your security”
The Insider Threat
The insider threat – the breaking of trust by one of your team is probably the hardest cyber security incident to deal with. Without trust organisations cannot function. Here is an example from the world stage where China is accused of stealing intellectual property from computer chip manufacturer ASML : …
Ransomware Mini-Series (2023)
Part 6 of my ransomware mini-series is published today on our online training site CyberAwake. Ransomware: Is it a Threat? (Part 1) A Bag of Spanners – Planning and Preparation (Part 2) Minimise the Damage – Planning and Preparation (Part 3) Detecting Ransomware (Part 4) Ransomware – What Not To …