Yesterday CyberAwake published my article looking at how snippets of information can leak out of a company and aid a threat actor:
Why threat actors will stick with phishing attacks rather than moving onto move hi-tech attacks?
I really liked this article. I have covered various highly involved cyber attacks over the last few months, deepfakes, hacking cars, air–gap attacks but as it describes in this article, you can use technology to steal those credentials or you can just ask nicely for them: Phishing works so well …
Because It’s Friday… Data, Data, Data and do you know what a computer data punch card is?
Whilst researching for yesterday’s installment of the Insider Threat series, that I am writing over on our online training site CyberAwake, I read an article by Bret Arsenault, from Microsoft that opened with this quote: The amount of data captured, copied, and consumed is expected to grow to more than …
Who are the targets for phishing campaigns?
The threat actors will go after anyone who they can exploit, steal credentials from, or who has something the criminal wants! In this case it is workers for the forthcoming US elections. This one is targetting people in a privileged position: US election workers hit with phishing, malware emails • …
Continue reading “Who are the targets for phishing campaigns?”
A series on the Insider Threat – and your first tip on dealing with it!
Recently I have covered a couple of incidents that revolve around a betrayal of trust – often called the insider threat: The Insider Threat – it may be at the top of the company… – Smart Thinking Solutions The Insider Threat and $250,000 – Smart Thinking Solutions This got me …
Continue reading “A series on the Insider Threat – and your first tip on dealing with it!”