In August the support team at Octagon Technology edited the company’s newsletter – whilst Diana and I were away. They chose a theme of artificial intelligence (AI) – here are the articles they wrote: Careful with that A.I. Eugene ! / How NOT to A.I. / Stop feeding the machine. …
If they annoy you enough…
…you might just give the threat actors your Google credentials. A malware campaign, detected by OALABS researchers, locks your web browser into “kiosk mode” and asks you for your Google credentials to unlock it. Of course, the malware then steals those credentials. Malware locks browser in kiosk mode to steal …
Of course they would…
The story normally is “hackers place malicious code into legitimate projects on software repository”. This is a favourite threat actor tactic as it can infect many users, when software developers, unintentional, distribute the malicious code with their projects. Code Risk This story however is how threat actors are using these …
Phishing Primer – Social Engineering (pt. 1)
Just because it is me, I am going to start this Back-to-Basics mini-series by not talking about phishing emails but looking at a key component of a malicious email attack – social engineering. So what is Social Engineering? In its most basic form, it is the advertising we are all …
Continue reading “Phishing Primer – Social Engineering (pt. 1)”
Microsoft closes another door on the hackers
Microsoft has announced the end of Visual Basic scripting in Windows – this is a good thing for our cyber security as this tool is one of the most exploited by the threat actors. What started off as a good idea to provide individuals and organisations with a flexible platform …
Continue reading “Microsoft closes another door on the hackers”