Today there is an excellent illustration of how a phishing attack works on SANS Internet Storm. It is complete with the offer of something the victim wants and then simply steals the Microsoft credentials the victim supplies – all because of a well-crafted spam email. Credential Harvesting with Telegram API …
This cyber attack has still not been fixed… UPDATE
This post was first published on 31 August 2022 Update 5 October 2022 The cost of this attack – to the local taxpayer – is now predicted to be £1m. Russia-linked cyber attack could cost Gloucester City Council £1m – BBC News “Every time I ask the question about the …
Continue reading “This cyber attack has still not been fixed… UPDATE”
The Insider Threat and $250,000
What happens when the relationship between you and a trusted employee breaks down either through ill will or just the fact that they are leaving and taking your client database with them? This is the insider threat. In the case of a “high-profile financial company in Hawaii”, a former employee who …
VPNs are an important part of any cyber security plan
The moment you step outside your secure office and want to work – or you need anonymity on the internet – a VPN is your go to solution for privacy and security. I have written an article for the blog on our cyber awareness and online training site CyberAwake looking …
Continue reading “VPNs are an important part of any cyber security plan”
Hacking is not just data theft and ransomware – it can be reputation damage. Some advice about your WordPress website and your reputation.
Fast Company an American magazine was hacked and abusive articles added to its news feeds, resulting in this material getting a wider audience through syndication on the Apple News app. The Apple News channel was quickly disabled and Fast Company took its site down pending a fix but the damage was …
New ransomwareattacks following the leak of LockBit software by a hacker insider
I reported on the information leak that LockBit suffered when one of the hacker developers has a spat and leaked the software code. Security software vendors would have been checking out this code to improve their defences but there was also the opportunity for less experienced hackers to improve their …
Continue reading “New ransomwareattacks following the leak of LockBit software by a hacker insider”
A word about BYOD
I have just published an article over on our online training site – CyberAwake – looking at some of the steps in examining the risk of using employee devices for work purposes – BYOD or Bring Your Own Device. Are you using Bring Your Own Device – BYOD – to …