In the run up to Christmas many of us are shopping online – I know I am. It is tempting to keep following links looking for the best prices and the best price is what the internet promises us because we can shop everywhere. However the bad actors know this …
Bypass your cybersecurity scanners
We all depend heavily on anti-virus scanners, they are a primary tool on our local machines and servers to combat the simplest of cyber attacks – sending us malware via email. Consequently any techniques developed by bad actors to get malicious packages through those scanner is a major concern. There …
Attachments are a favourite attack vector
It obvious that for businesses to work they will be constantly exchanging email with clients, suppliers and internally and that many of these emails will contain important attachments. If we recognise this then so do the bad actors and they will exploit this business function if they can. Some attachments …
Continue reading “Attachments are a favourite attack vector”
The SolarWinds breach – a write up
SolarWinds and the Holiday Bear Campaign: A Case Study for the Classroom – Lawfare (lawfareblog.com) This is a considered and well researched article by Professor in Law Bobby Chesney, looking at the how and why of the much publicised and far reaching SolarWinds security breach and subsequent attacks on their …