Today there is an excellent illustration of how a phishing attack works on SANS Internet Storm. It is complete with the offer of something the victim wants and then simply steals the Microsoft credentials the victim supplies – all because of a well-crafted spam email. Credential Harvesting with Telegram API …
This cyber attack has still not been fixed… UPDATE
This post was first published on 31 August 2022 Update 5 October 2022 The cost of this attack – to the local taxpayer – is now predicted to be £1m. Russia-linked cyber attack could cost Gloucester City Council £1m – BBC News “Every time I ask the question about the …
Continue reading “This cyber attack has still not been fixed… UPDATE”
The Insider Threat and $250,000
What happens when the relationship between you and a trusted employee breaks down either through ill will or just the fact that they are leaving and taking your client database with them? This is the insider threat. In the case of a “high-profile financial company in Hawaii”, a former employee who …
VPNs are an important part of any cyber security plan
The moment you step outside your secure office and want to work – or you need anonymity on the internet – a VPN is your go to solution for privacy and security. I have written an article for the blog on our cyber awareness and online training site CyberAwake looking …
Continue reading “VPNs are an important part of any cyber security plan”
Hacking is not just data theft and ransomware – it can be reputation damage. Some advice about your WordPress website and your reputation.
Fast Company an American magazine was hacked and abusive articles added to its news feeds, resulting in this material getting a wider audience through syndication on the Apple News app. The Apple News channel was quickly disabled and Fast Company took its site down pending a fix but the damage was …