This is not the headline you want you want to read, when you have written Microsoft into your cyber security plan as an A1 trusted supplier of services! Hackers exploited Windows 0-day for 6 months after Microsoft knew of it | Ars Technica Mine and your expectations of Microsoft is …
The Threat Actors will abuse any service for their own ends
Researchers are warning that threat actors are abusing the Google Cloud Run – an application and website development and management service – to distribute banking trojans on an industrial scale: Hackers abuse Google Cloud Run in massive banking trojan campaign (bleepingcomputer.com) Your takeaway Any applications or software you have written …
Continue reading “The Threat Actors will abuse any service for their own ends”
Cyber-breach reporting rules are a good thing for all of us
There are hundreds of reasons organisations, lobbyists and some politicians will quote for not reporting a cyber-security breach – most will have to do with money. The one reason the rest of us should be in favour of reporting rules is that it is our data that these organisations have …
Continue reading “Cyber-breach reporting rules are a good thing for all of us”
This is why a IT and Cyber Security audit makes sense
I am in the middle of an IT and Cyber Security audit for a company – which is why Diana is covering the CyberAwake articles at the moment. During the interviews I conduct, as part of my process, I was told no one used a global administrator account as their …
Continue reading “This is why a IT and Cyber Security audit makes sense”