A combination attack that exploits the Log4j vulnerability and VMware to deliver ransomware

I have published a lot on the log4j and log4shell exploits and vulnerability. CISA issued a special warning about the long term impact of the issue: CISA advisory for continued exploitation of Log4Shell in VMware Horizon Systems – Smart Thinking Solutions Here is another real world example of the exploitation …

How does ransomware get into my system? I’m careful!

Of course the threat actors use social engineering techniques and phishing emails: Fake copyright infringement emails install LockBit ransomware (bleepingcomputer.com) Ransomware is probably the biggest cyber security threat facing businesses today. Coming soon: Five essential skills you need to do your own cybersecurity – A Masterclass Are you facing cyber …