What happens when the relationship between you and a trusted employee breaks down either through ill will or just the fact that they are leaving and taking your client database with them? This is the insider threat. In the case of a “high-profile financial company in Hawaii”, a former employee who …
New ransomwareattacks following the leak of LockBit software by a hacker insider
I reported on the information leak that LockBit suffered when one of the hacker developers has a spat and leaked the software code. Security software vendors would have been checking out this code to improve their defences but there was also the opportunity for less experienced hackers to improve their …
Continue reading “New ransomwareattacks following the leak of LockBit software by a hacker insider”
The ups and downs of ransomware software development
Threat actors are always changing their malware and tactics to evade the technical solutions the anti-virus and other security solution vendors distribute. So it is no surprise that malware gets patches and updates as well: Colonial Pipeline hackers add startling new capabilities to ransomware operation – The Record by Recorded …
Continue reading “The ups and downs of ransomware software development”
Advice if you must use USB portable storage
Sometimes the easiest and best storage for your workflow, is a portable USB memory stick and the one thing that gives us a headache when we are carrying out a cyber security survey is the use of portable USB memory sticks! Do you want too why? Then hop over to …
Continue reading “Advice if you must use USB portable storage”
Block or Square they still suffered an insider data leak now they have to face the consequences…
The issue of a trusted insider betraying a trust either maliciously or for commercial gain is a problem we often discussed at university and never really came up with an answer. You need trusted people for any business to operate – you should use the “principle of least privilege” to …