Bandit Stealer malware is promoted by the hacker developers as the most advanced information stealer available to threat actors. It can exfiltrate data from most popular browsers including usernames and cookies and other system information such as IP addresses and details of a victim’s computer. The Telegram messaging app is …
On-premises Exchange Server Vulnerability
On-premises Exchange servers are still out there and they make great targets for threat actors, especially those with unpatched flaws. There is a new PowerShell based malware called PowerExchange and being linked to an Iranian threat group APT34 that backdoors Microsoft Exchange servers. New PowerExchange malware backdoors Microsoft Exchange servers …
Continue reading “On-premises Exchange Server Vulnerability”
BrutePrint. I wrote about the Android risk last week…
…and I am going to start the week off with the Android risk! BrutePrint! This is only research at the moment but what starts off in the lab can migrate to the wild once threat actors know what to look for! A new brute force attack on Android fingerprint biometric …
Continue reading “BrutePrint. I wrote about the Android risk last week…”
The Android Risk
There are many posts on Smart Thinking highlighting malicious Android apps and I am constantly reminding you that if you have Android devices in your bring-your-own-device (BYOD) scheme then you need to take positive steps to manage them. Even if they are not your devices, they will have your information …
The Capita Data Breach
Why does the Capita data breach have something to teach every organisation about cyber security? When a company has many clients for whom they do so many things, it stands to reason that threat actors will take an interest. One breach and the criminals get access to a wide range …
