Here is a clue – social engineering. I am often asked this by clients, especially those who I am suggesting need to up their cyber security game. Here is a very good article by the cyber security expert Brian Krebs looking in detail at the recent high profile data breaches …
ChatGPT – the fakes
Threat actors are always looking for the opportunity to abuse someone’s trust, exploit a tragedy or take advantage of something in the news, etc. etc. etc.. ChatGPT is in the news. Earlier this year, the popular artificial intelligence (AI) ChatGPT service started to charge for access and this has prompted …
Would you be taken in?
I have written a lot about the fact that many cyber attacks include an element of social engineering, to tease the victim into lowering their guard and doing what the threat actor wants. Here is an excellent example of that, described by Xavier Mertens on SANS Internet Storm, where the …
QakNote – OneNote malware now has name
I use OneNote a lot – so I had to follow up on my previous post about OneNote attachments being used as an attack vector. OneNote has become the threat actors new choice of attachment probably because Microsoft closed the door on macro attacks. In the wild, Microsoft OneNote’ .one’ …
Practice Drinking Coffee* better known as Planning and Preparation
Sorry, this is not a coffee* appreciation article it is an article about planning and preparation for an incident. Planning and Preparation = Good Governance Businesses and organisations need a cyber security policy and a plan covering what they do to mitigate the risk of an incident and what they …
Continue reading “Practice Drinking Coffee* better known as Planning and Preparation”