Threat actors have to host their malicious login stealing pages somewhere – why not in Amazon’s cloud: Hiding a phishing attack behind the AWS cloud
Microsoft versioning vulnerability – we have the solution
This is a ransomware encryption attack, that Octagon’s backup solution is designed to mitigate against. The attack exploits the Microsoft 365 versioning feature, when editing a file, saved in SharePoint or OneDrive. Once the threat actors gets into the cloud storage they can execute their attack and start encrypting your …
Continue reading “Microsoft versioning vulnerability – we have the solution”
Threat actors come up with yet another way to steal your Microsoft credentials…
I have just written this article, showing that more than 24billion stolen credentials are available for sale on the dark web: Now here is a voice mail phishing attack that is designed to steal your Microsoft credentials – so they can join the other 24 billion on the Dark Web: …
Continue reading “Threat actors come up with yet another way to steal your Microsoft credentials…”
Too good to be true – You’ve won! Is it time you and your team got some training to combat social engineering?
It is the oldest and easiest bit of email social engineering – promise you something that is too good to be true. Your tempted and the hackers have got you. You think this would have gone the way of “princes offering to share millions with you, if you will just …