Before downloading any Zoom apps, make sure you are on a legitimate site. Threat actors have created fake malicious sites, that do not provide Zoom apps but instead download Vidar Stealer, information stealing malware. Fake sites fool Zoom users into downloading deadly code • The Register This malware will exfiltrate …
If there is way for threat actors to abuse legitimate tools, of course they do it!
Google’s Tag Manager (GTM) is a system for managing HTML and Javascript analytic tags on website, especially ecommerce sites. A report by The Recorded Future has found that threat actors have been installing malicious e-skimmers scripts that can steal customer card data and other personally identifiable information exploiting GTM. Google …
Do not use the password Qwerty1234 – the hackers know that one!
It is being reported that the hack on the Holiday Inn was done for fun and that the hackers, from Vietnam, used the password Qwerty1234 to gain access. IHG hack: ‘Vindictive’ couple deleted hotel chain data for fun – BBC News If you want your people to have a better …
Continue reading “Do not use the password Qwerty1234 – the hackers know that one!”
Do you have a Samsung device?
Samsung suffered its second major data breach of 2022, but the details it is releasing are few and far between. There is some excuse about it being a holiday weekend or the data being of low value. Impact of Samsung’s most recent data breach unknown | TechRepublic I am sure …
Advice if you must use USB portable storage
Sometimes the easiest and best storage for your workflow, is a portable USB memory stick and the one thing that gives us a headache when we are carrying out a cyber security survey is the use of portable USB memory sticks! Do you want too why? Then hop over to …
Continue reading “Advice if you must use USB portable storage”