Before heading out of the office on leave, I wrote an article looking at “pay” or “not pay” the ransom:
When your technical defences fail – CyberAwake
I have written about how to defend your cybersecurity when your firewalls, anti-virus and other defences fail you:
A new place to get a different viewpoint on cyber security – CyberAwake
As well as yesterday being the day we published our 1000th post here, on Smart Thinking. It was also the day we launched the blog on the CyberAwake training site. The content of the CyberAwake blog will be different from Octagon and Smart Thinking, with an emphasis on the issues …
Continue reading “A new place to get a different viewpoint on cyber security – CyberAwake”
OpenDocument files distributing stealth malware – make sure your team can recognise these types of attack.
This report is from HP’s Threat Research Blog and is about a threat discovered impacting hotels in South America. But it illustrates the wide range of threats that can get to you via an email attachment and has some examples you can look at. Stealthy OpenDocument Malware Deployed Against Latin …