Researchers at Google have been tracking various phishing cyber attacks, that are exploiting the Russia Ukraine conflict, but originate from other countries. China, Iran, North Korea, Russia and others using Ukraine invasion in phishing attacks: Google – The Record by Recorded Future Both state sponsored and financially motivated groups are …
The Isle of Wight Council – when is a data breach not really a breach?
When does the term “data breach” help you PR machine mitigate a cyber security data breach – especially when it involves the personal information of children? When you (The Isle of Wight Council) actually just email the data out. Isle of Wight children’s details sent out in data breach – …
Continue reading “The Isle of Wight Council – when is a data breach not really a breach?”
Report a malicious email through the NCSC website – and more password advice
You can report a suspect malicious email through the National Cyber Security Centre website – over 10,000,000 have been reported: Nation of digital defenders blow the whistle on over 10… – NCSC.GOV.UK Report a scam email – NCSC.GOV.UK There is also good advice there about passwords – but see our …
Continue reading “Report a malicious email through the NCSC website – and more password advice”
Guernsey sees an increase in phishing email cyber attacks – training is the best defence
According to the States of Guernsey islanders have faced a rapid increase in cyber attacks since the start of the Ukraine Russia conflict. This is based on information from a local cyber-security firm, who had a client hacked by phishing emails. Guernsey cyber-security warning for islanders and businesses – BBC …
Anatomy of a malicious email – what you should be looking out for
Brad Duncan has a very good article, with an example of the phishing email and infected package on SANS Internet Storm Centre today. Qakbot infection with Cobalt Strike and VNC activity – SANS Internet Storm Centre Being familiar with these types of phishing email is your organisation’s best defence. At …
Continue reading “Anatomy of a malicious email – what you should be looking out for”