I am frequently asked what I think of DropBox or other method for organisations to share files across the internet with other organisations, often after I have been speaking about Microsoft 365, OneDrive and SharePoint. Possibly after I have mentioned that these services that have, authentication, authorisation and accountability (AAA) …
Tampering with open source software
Recently the security of open source software has been questioned, particularly with respect to Linux vulnerabilities that have a huge impact due to Linux’s use as internet infrastructure. When volunteer coders are keeping the software secure – who takes responsibility. Steps have started to be taken to increase the security …
Do you have an ASUS Router? Do you know what an ASUS Router is?
If you cannot answer the above questions, then it is possible that your business continuity documentation is out of date or non-existent. We can help with that! Here is an attack in the wild that is impacting ASUS hardware. Cyclops Blink malware sets up shop in ASUS routers • The …
Continue reading “Do you have an ASUS Router? Do you know what an ASUS Router is?”
New Android malware – Escobar – stealing MFA codes among other secret data
Escobar mobile malware targets 190 banking and financial apps, steals 2FA codes | TechRepublic A version of this malicious software was found in circulation cloaked as McAfee software. This software is being offered for rent on the Dark Web so it could be used by multiple hackers who do not …
Continue reading “New Android malware – Escobar – stealing MFA codes among other secret data”
Inside Trickbot – UPDATED
Here is a geeky article from a Microsoft research team – only read it if the intricacies of a hack interest you. Trickbot is a well established, sophisticated piece of malware that has been developed and expanded since it was first discovered in 2016. This constant change makes it a …