Here is another article looking at the impact of the NSO Group’s Pegasus spyware. India’s battle with Pegasus tells a bigger tale of tech laws • The Register Commercial spyware – buy it (if you are an approved government or law enforcement agency) and start spying. The allegations are that …
Budget friendly malware increases your risk
When breaking into a computer system cost significant money and resources, only a few capable individuals and groups did it. Now with the availability of cloud services and mass distribution the best resourced cyber gangs are turning to a gig economy model, combined with the IT “as-a-service” model to sell …
Continue reading “Budget friendly malware increases your risk”
Too good to be true – You’ve won! Is it time you and your team got some training to combat social engineering?
It is the oldest and easiest bit of email social engineering – promise you something that is too good to be true. Your tempted and the hackers have got you. You think this would have gone the way of “princes offering to share millions with you, if you will just …
Anatomy of a RAT attack using a password protected Excel attachment
This is the classic way a hacker gets their payload into your business – send you a spreadsheet that needs your immediate attention. Include the password in the email, this makes it more likely for you to open the file – make it look official and your cyber security threat …
Continue reading “Anatomy of a RAT attack using a password protected Excel attachment”
Do you know what “business email compromise” is? Better still do you know how to combat this cyber security attack?
Research from the FBI shows how costly this type of cyber attack is to businesses: FBI: Business Email Compromise attacks led to more than $43 billion in losses since 2016 – The Record by Recorded Future At Smart Thinking and Octagon, we have had to investigate and deal with several …