Do you use FishPig ecommerce software? You don’t know. Then check now because it may have been compromised.

This is a classic supply chain attack. UK based FishPig, seller of Magento WordPress integrations, ecommerce software has discovered that its distribution server had been compromised, which allowed threat actors backdoor access to the customer’s systems. The ecommerce software is believed to be used by more than 200,000 websites. Breach …

Phishing attacks will become easier for the threat actors and harder for you defend against

There is no doubt that threat actors are becoming more organised, with skilled organisations, not only carrying out attacks, but suppling highly capable hacking tools to less skilled organisations – fo a cut of the illicit profits: New EvilProxy service lets all hackers use advanced phishing tactics (bleepingcomputer.com) This one …

False positives something we all have to deal with – Including Microsoft. At least read this post for its two Hitchhiker’s Guide to the Galaxy references!

tesla in space dont panic

Our team often get desperate calls from clients, who are expecting an urgent email which they know has been sent, but they have not received it. The support staff usually quickly check the anti-virus, advanced threat protection, the firewall or other barrier/filtering protection (depending on what the client has) to …

Web browser extensions a great idea for functionality but also a cyber security risk – what can you do?

Most browsers offer the option of adding extensions that will add functionality to the browser, however, of course, the threat actors exploit these to carry out various cyber attacks: Chrome extensions with 1.4 million installs steal browsing data (bleepingcomputer.com) Here are the extensions that the McAfee researchers discovered: Netflix Party (mmnbenehknklpbendgmgngeaignppnbe) …