This post was first published on 9 May 2022 Here is yet another example of malware and it’s delivery system from SANS TA578 using thread-hijacked emails to push ISO files for Bumblebee malware – SANS Internet Storm Centre The rise of Bumblebee malware was first reported earlier this month: More …
India and Pegasus
Here is another article looking at the impact of the NSO Group’s Pegasus spyware. India’s battle with Pegasus tells a bigger tale of tech laws • The Register Commercial spyware – buy it (if you are an approved government or law enforcement agency) and start spying. The allegations are that …
Budget friendly malware increases your risk
When breaking into a computer system cost significant money and resources, only a few capable individuals and groups did it. Now with the availability of cloud services and mass distribution the best resourced cyber gangs are turning to a gig economy model, combined with the IT “as-a-service” model to sell …
Continue reading “Budget friendly malware increases your risk”
Too good to be true – You’ve won! Is it time you and your team got some training to combat social engineering?
It is the oldest and easiest bit of email social engineering – promise you something that is too good to be true. Your tempted and the hackers have got you. You think this would have gone the way of “princes offering to share millions with you, if you will just …
Anatomy of a RAT attack using a password protected Excel attachment
This is the classic way a hacker gets their payload into your business – send you a spreadsheet that needs your immediate attention. Include the password in the email, this makes it more likely for you to open the file – make it look official and your cyber security threat …
Continue reading “Anatomy of a RAT attack using a password protected Excel attachment”