Pendragon car dealer refuses $60 million LockBit ransomware demand (bleepingcomputer.com) I do not have any login details with them, just some credit card stuff and other financial information. Of course, they also know all about my car. I wonder if anything to do with the wireless key security has been …
Phishing wave after Revolut security is compromised and personal information is stolen
Following a breach of security of the international financial technology company Revolut, which was quickly dealt with by their security team, over 50,000 client accounts were compromised and information stolen. Although information such as, email addresses, phone numbers, account data and some limited credit/debit card data was stolen, PIN, detailed …
InfoSec in Indian now always seems to be in hurry
Following the Indian government directives about reporting of cyber-security incidents and the requirement to keep VPN user logs, both of which had ridiculously short deadlines for compliance – here is another: Indian stock markets given ten day deadline to file reports • The Register India in the news – when …
Continue reading “InfoSec in Indian now always seems to be in hurry”
Redline information stealer malware targets Internet Explorer
Emotet is among the most distributed malware in March, Redline malware has been being deployed extensively by hackers in April 2022, specifically targeted at Internet Explorer More than 10,000 Redline malware attacks in April targeting Internet Explorer vulnerability – The Record by Recorded Future RedLine malware can steal login credentials …
Continue reading “Redline information stealer malware targets Internet Explorer”
Why you need to look at your cybersecurity risks and mitigations
Here are a couple of longer articles, that give you some idea into the scale of cyber security and information security responsibilities, owners, directors and senior managers face in the current threat landscape. Over 42 million people in the UK had financial data compromised | TechRepublic Report: Many SMBs wouldn’t …
Continue reading “Why you need to look at your cybersecurity risks and mitigations”