I have posted the latest part of my occasional series about the Insider Threat cyber security risk, on our online training site, CyberAwake:
Advice if you must use USB portable storage
Sometimes the easiest and best storage for your workflow, is a portable USB memory stick and the one thing that gives us a headache when we are carrying out a cyber security survey is the use of portable USB memory sticks! Do you want too why? Then hop over to …
Continue reading “Advice if you must use USB portable storage”
Block or Square they still suffered an insider data leak now they have to face the consequences…
The issue of a trusted insider betraying a trust either maliciously or for commercial gain is a problem we often discussed at university and never really came up with an answer. You need trusted people for any business to operate – you should use the “principle of least privilege” to …
Malware targets cryptocurrency wallets and browsers
The PennyWise malware is masquerading as crypto-coin mining software and being advertised in a variety of YouTube videos – showing that any communications method can be exploited for phishing attacks. PennyWise malware on YouTube targets cryptocurrency wallets and browsers | TechRepublic To help build confidence in the product, the threat …
Continue reading “Malware targets cryptocurrency wallets and browsers”
Researchers discover a long-term cyber espionage campaign originating in China
Researchers uncover years-long espionage campaign targeting dozens of global companies – The Record by Recorded Future The US Justice Department and the FBI have received information from researchers at Cyberreason, of a long term infiltration of dozens of unnamed North American companies, for purposes of stealing company secrets and IP. …
Continue reading “Researchers discover a long-term cyber espionage campaign originating in China”