South Staffordshire PLC, the parent company of South Staffs Water and Cambridge Water, is warning that customer bank details may have been stolen by cyber criminals. This information and other customer details taken during the data breach may now be on the Dark Web. It has started informing the customers …
I cannot say I am surprised by this – it is just a rush for profit…
…and the customers are likely to be the ones paying for the corporate mistakes and shortcuts. One of our team has just been away on holiday and had to leave their new shiny electric SUV at home because of “charging stress” between their home and the holiday cottage 300 miles …
Continue reading “I cannot say I am surprised by this – it is just a rush for profit…”
Software supply chain weaknesses
Software and code repositories are a great resource for web and software developers – they save time, client’s money and get quality modules for their projects. GitHub is one of the most popular – with many major software players using it to develop their code and other developers, large and …
Where is the internet most vulnerable?
The Asia-Africa-Europe-1 internet cable travels 15,500 miles along the seafloor, connecting Hong Kong to Marseille, France. As it snakes through the South China Sea and toward Europe, the cable helps provide internet connections to more than a dozen countries, from India to Greece. When the cable was cut on June …
GitHub – probably one of the biggest targets for threat actors
GitHub is one of the most popular software repositories so it stands to reason that threat actors will always be searching for ways in as infecting code at source that is then reused in multiple applications is a cost-effective way to run a cyber attack. GitHub has just patched a …
Continue reading “GitHub – probably one of the biggest targets for threat actors”
Software repositories are a target for threat actors
If you, as a threat actor, could embed your malware into a software module, that is then used by many innocent and unaware software developers in their packages, they release to the general public, wouldn’t you? That looks like a lot of infected machines for a small amount of work. …
Continue reading “Software repositories are a target for threat actors”
Ransomware highlights
I do not want you to think ransomware has gone away whilst I am on leave – here are a few of the biggest ransomware stories of the week from Bleeping Computers: Argentina’s Judiciary of Córdoba hit by PLAY ransomware attack (bleepingcomputer.com) BlackByte ransomware gang is back with new extortion …