This post was originally made on 2 March 2022. It will be updated as the Russian Ukraine Conflict develops and will highlight the cyber security issues facing organisations and individuals at this time. The National Cyber Security Centre (NCSC) is advising all UK organisations to review and improve their cyber …
Windows Calculator as an attack vector
Threat actors have to find a way to get their malware onto your systems – phishing emails is an obvious method – Qakbot malware is the next step. This malware also known as Qbot, has been found to be to be intermediate software used by threat actors to infect victim’s …
Brute force attacks on Window 11
Disabling risky services for any OS or software “out-of-the-box” is always a good idea. If you need it, then you or your system administrators can enable it. A brute force attack is where a threat actor – or normally a threat actor computer – will try a range of different …
Has the July’s Patch Tuesday broken Access applications? UPDATED 22 July 2022 – there is a fix.
Updated 22 July 2022 Microsoft is addressing this issue: Error when trying to open an ACCDE/MDE file created in a different version of Access (microsoft.com) However other optional updates may impact printing! Original post: Microsoft is investigating reports that applications based on Microsoft Access 2016 and 2013 are failing following …
Social engineering – your trust abused on YouTube
Here is a story featuring another Google product – that makes a huge profit for Google – that is being used and abused by threat actors against legitimate users: Convincing ‘YouTube’ Google ads lead to Windows support scams (bleepingcomputer.com) If you just make the YouTube videos look as though they …
Continue reading “Social engineering – your trust abused on YouTube”