Very, very occasionally a ransomware attack has a happy ending! However do you need training in cyber security planning?

Masterclass September 2022

In December 2019, Maastricht University in the Netherlands, decided to pay the ransom, of €200,000 at the time, to release the data of over 22,00 students, the academics and the university administration. Maastricht University wound up earning money from its ransom payment (bleepingcomputer.com) Since then the Netherlands Public Prosecution Service …

Are you trying to improve your organisation’s cyber security? Lessons from the largest data theft ever. UPDATED 11 July 2022.

Masterclass September 2022

This post was first published on 5 July 2022. The Chinese President, Xi Jinping, is calling for improved cyber security, in the country following the unprecedented alleged data theft by ChinaDan: Security warning after sale of stolen Chinese data – BBC News Details of the theft are starting to be …

New advice issued by the National Cyber Security Centre for the “long haul” with the Russia Ukraine conflict

NCSC logo

I have been explaining throughout the period of the Russia Ukraine conflict, that even though the cyber-threat spread has been limited, so far, it may not remain so and it may take time for the threat to UK organisation and individual systems to develop. Today the National Cyber Security Centre …

The Follina threat has not gone away just because Microsoft has issued a patch – Octagon has the solution

Follina email phishing

The threat actors are still attempting to exploit the Follina flaw in Microsoft Word – looking for those of you out there who have not bothered to run the updates: XFiles info-stealing malware adds support for Follina delivery (bleepingcomputer.com) Have you checked all the machines in your organisation have run …

Credential stealer

racoon

The Raccoon Stealer malware is back with an updated version, with added functionality and capabilities. This malware is offered as malware-as-a-service (mimicking a legitimate business model), enabling less well equipped threat actors to implement sophisticated cyber security attacks. Expect the use of this malware to increase as threat actors, looking for …