Last week I had a prospective client take me up on our free 30 minute “ask me anything about your cyber security” Teams meeting. Things went well, she had some questions, I ran through my advice checklist with her – everyone was happy until I asked about their anti-virus – …
Social Engineering nets $1.5B
Having written yesterday about why technical cyber security defences are essential but are flawed because of the human element can be exploited directly by social engineering, here is a costly real world example of social engineering working: North Korean Hackers Steal $1.5B in Cryptocurrency – Schneier on Security There is …
When technical cyber security fails you…
It is not unreasonable to say that ransomware is at epidemic levels, report after report says that malware, ransomware and cyber extortion is on the rise (Beaman, Barkworth, Akande, Hakak and Khan. 2021 and Oz, Aris, Levi and Uluagac. 2021), and that cyber security is important. We all take precautions …
Phishing network disrupted
Phishing attacks are repeatedly shown to be the number one cyber security risk for organisations in the UK – see the report linked below. So, anything that disrupts the threat actor’s ability to carry out and exploit these types of cyber-attacks is good news for everyone. Microsoft and the US …
If they annoy you enough…
…you might just give the threat actors your Google credentials. A malware campaign, detected by OALABS researchers, locks your web browser into “kiosk mode” and asks you for your Google credentials to unlock it. Of course, the malware then steals those credentials. Malware locks browser in kiosk mode to steal …