Ransomware attacks delivered and monetised with little technical knowledge

The model of ransomware attacks has definitely moved for a backroom hackers sending malware out, to a corporation style operation, complete with updates, support and marketing of the illicit tools. Small opportunist threat actors remain, and always will, hackers have to start somewhere, as is shown by this article at …

OpenDocument files distributing stealth malware – make sure your team can recognise these types of attack.

This report is from HP’s Threat Research Blog and is about a threat discovered impacting hotels in South America. But it illustrates the wide range of threats that can get to you via an email attachment and has some examples you can look at. Stealthy OpenDocument Malware Deployed Against Latin …

More and more phishing attacks – each with their own special touch to exploit the trust of your people!

phishing email threat

A UK Government’s report looking at cybersecurity breaches across the country, (UK Government. 2022), prepared by Department for Digital, Culture, Media & Sport (and sport!) showed clearly email phishing is a real threat: “Of the 39% of UK businesses who identified an attack, the most common threat vector was phishing …