As part of the Cyber Security Awareness Training I deliver, I always emphasise that any credentials people are entrusted with have a value and should be protected accordingly. Here is the proof of that statement – credentials for sale: ‘Russian Market’ emerges as a go-to shop for stolen credentials – …
To Catch A Thief… A Story of a Security Operations Centre
I am sorry, the title is a bit misleading, but once you have read the article, I am sure you will see how we – and the Security Operations Centre – could have caught a thief. Additionally, it is not about the Hitchcock movie; however, some of the action does …
Continue reading “To Catch A Thief… A Story of a Security Operations Centre”
Signalgate
I am not sure anyone is actually calling it that… We have all seen and or heard of this story that is running in the US and around the world: Trump and intelligence chiefs play down Signal group chat leak – BBC News I am not going to get into …
Identity Theft (part 1)
Identity theft, as cyber attacks go, is pretty easy to understand – a threat actor gains control of a user’s credentials (identity) and then attacks the service (organisation), posing as that user. There are nuances but that is the attack in the briefest of terms. Credential and identity theft are …
Attacks on M365 Credentials
It still works, set up a lot of devices to just try their luck to break into as many M365 accounts as possible – it will work sometimes. In this case over 100,000 devices have been hijacked to create a botnet that also side steps MFA security using an outdated …