Before I start this week’s Wednesday Bit, let me send you over to read this first – you need to understand the value I put on encryption: Encryption or Not Encryption The real-world case for encryption The other week I got introduced to a new client under difficult circumstances – …
So you want to know how a phishing campaign works?
This is not clickbait for hackers! Jan Kopriva has written an excellent article taking a phishing campaign apart so you can understand why the hackers like this attack vector to get into your organisation. Another day, another phishing campaign abusing google.com open redirects – SANS Internet Storm Center It is …
Continue reading “So you want to know how a phishing campaign works?”
Things do wear out…
We have been working over the last few years to move all of our clients from Microsoft Exchange 2016 and 2019 servers onto more modern and hopefully more secure platforms. Once Microsoft stops cyber security support for these servers, the threat actors will attack any that are still online. Microsoft: …
What’s in your email?
This article started life in couple of ways. Over on CyberAwake I re-ran an article from summer 2022, looking at how some information, useful to a threat actor, could leak out of your organisation this summer, just because of the use of a simple setting in Outlook: The Out-Of-Office Email …