The death of Her Majesty Queen Elizabeth II and the associated ceremonies and period of national mourning will be no exception: Potential phishing activity update – NCSC.GOV.UK The National Cyber Security Centre has issued a warning that the potential for malicious phishing, social engineering and scam cyber-attacks is very high …
Do you use FishPig ecommerce software? You don’t know. Then check now because it may have been compromised.
This is a classic supply chain attack. UK based FishPig, seller of Magento WordPress integrations, ecommerce software has discovered that its distribution server had been compromised, which allowed threat actors backdoor access to the customer’s systems. The ecommerce software is believed to be used by more than 200,000 websites. Breach …
Linux malware not your problem – but it is.
Technical cyber security defences are getting better – there is no doubt about that – just keep the security software updated and do not let anyone argue with the advice and actions the anti-virus or advanced threat protection gives or makes. However as technical defences improve the threat actors find …
Continue reading “Linux malware not your problem – but it is.”
Phishing attacks will become easier for the threat actors and harder for you defend against
There is no doubt that threat actors are becoming more organised, with skilled organisations, not only carrying out attacks, but suppling highly capable hacking tools to less skilled organisations – fo a cut of the illicit profits: New EvilProxy service lets all hackers use advanced phishing tactics (bleepingcomputer.com) This one …
False positives something we all have to deal with – Including Microsoft. At least read this post for its two Hitchhiker’s Guide to the Galaxy references!
Our team often get desperate calls from clients, who are expecting an urgent email which they know has been sent, but they have not received it. The support staff usually quickly check the anti-virus, advanced threat protection, the firewall or other barrier/filtering protection (depending on what the client has) to …
