I have published a lot on the log4j and log4shell exploits and vulnerability. CISA issued a special warning about the long term impact of the issue: CISA advisory for continued exploitation of Log4Shell in VMware Horizon Systems – Smart Thinking Solutions Here is another real world example of the exploitation …
LockBit and the Italian Revenue Agency
The prolific cyber criminal gang, LockBit, have released screens shots apparently showing that they have stolen 100GB of data from the Agenzia delle Entrate, or the Italian Government Tax Department. At the moment only a small sample of the data has been made public by LockBit, to convince the Italian …
Cyber attacks on governments large and small
Only months after the Albanian government opened its online portal, National Agency of the Information Society (AKSHI), it has has to be closed, along with other government websites due to a sustained cyber attack (I will avoid the word “sophisticated” they used in their press release). Investigations are ongoing as …
Continue reading “Cyber attacks on governments large and small”
Now the ransomware gangs are offering bug bounties
It is an accepted practice for software vendors to offer a bug bounty to people who discover a flaw in their software, and report it to them. The vendor can then, hopefully, fix the vulnerability before a threat actor can exploit it. Now the ransomware gangs are at it – …
Continue reading “Now the ransomware gangs are offering bug bounties”
How does ransomware get into my system? I’m careful!
Of course the threat actors use social engineering techniques and phishing emails: Fake copyright infringement emails install LockBit ransomware (bleepingcomputer.com) Ransomware is probably the biggest cyber security threat facing businesses today. Coming soon: Five essential skills you need to do your own cybersecurity – A Masterclass Are you facing cyber …
Continue reading “How does ransomware get into my system? I’m careful!”