Whilst I was researching for my VPN article yesterday, I came across something I wrote back at the end of 2022 about hybrid worker cyber security. Cyber Security and Hybrid Working I am in the middle of an IT and Cyber Security Audit for a client and just last week, …
Another chapter in my Phishing Email series is published today
We are getting close to the end of this Back-to-Basics primer looking at phishing email attacks – here is the next article in the series: Email Phishing – Back to bait… (pt. 9) – CyberAwake Back-to-Basics Phishing Email Primer Here are the earlier parts if you missed them: Phishing Primer …
Continue reading “Another chapter in my Phishing Email series is published today”
Phishing Email – It is about time we looked at some… (pt.8)
For this week’s installment of my Phishing Email Primer, I thought it would be a good idea to show you and your teram some examples of what a phishing email looks like. But I had two problems with this. My Phishing Email Problems The first one was trying to find …
Continue reading “Phishing Email – It is about time we looked at some… (pt.8)”
Going back in time…
This post is about one of my articles from 2023, which having just started on an IT and Cyber Security Audit for an organisation, I realised was relevant to the new project. All the board members and senior managers got a link to this article: Cyber Security The Layer Cake …
Credentials are King
Threat actors are always looking for good sources of valid (stolen) email and password combinations – and there are many hundreds of millions available to them. 361 million stolen accounts leaked on Telegram added to HIBP (bleepingcomputer.com) Once they have these credentials, the threat actors will be trying them out …