I have written many time about how threat actors are always looking for the human event that they can take advantage of – with no scruples! The bigger the event, the bigger the opportunity. They have no scruples so to them it does not matter that they are taking advantage …
Microsoft OneNote malware mitigation
I love OneNote – it is my go to, cross platform/cross device app (it even works on my watch!) so I have been watching the increasing threat actor activity using OneNote attachments with interest, as we all use OneNote her at Smart Thinking and Octagon and I have encouraged many …
Windows Secure Boot compromised
Windows secure boot is a tool to prevent unauthorised software from running on Windows machines protecting the firmware and other essential systems. A UEFI secbootkit malware package known as BlackLotus – readily available for sale on hacker forums – can now bypass this security feature: It’s official: BlackLotus malware can …
CEO Fraud: Act quickly because your boss sent you this email…
…or did she? I got an email from Diana the other day asking me to transfer some company money to the listed account – because if I didn’t our Microsoft 365 account would be deleted. It also conveniently explained that she was in a meeting and could not be contacted …
Continue reading “CEO Fraud: Act quickly because your boss sent you this email…”
Exploitation and how to avoid it…
…just slow down. I often use the example of a successful social engineering/phishing email as one that arrives when you are under work pressure or just before before you want to leave for the weekend. Both are periods when the threat actors know your guard will be down – they …