This is a warning that we not only access App stores from our phones, but smart TVs, smart speakers, voice assistants, games consoles, computers and other devices all have app stores we use. Application Stores – NCSC.GOV.UK If there are any weaknesses in these various app stores, then you can …
Anatomy of a RAT attack using a password protected Excel attachment
This is the classic way a hacker gets their payload into your business – send you a spreadsheet that needs your immediate attention. Include the password in the email, this makes it more likely for you to open the file – make it look official and your cyber security threat …
Continue reading “Anatomy of a RAT attack using a password protected Excel attachment”
CISA cyber security advisories – exploits, cisco devices, Firefox
F5 Releases Security Advisories Addressing Multiple Vulnerabilities | CISA Mozilla Releases Security Updates for Firefox and Firefox ESR | CISA CISA Adds Five Known Exploited Vulnerabilities to Catalog | CISA F5 is a company supplying infrastructure performance and security services to companies – so if you use them, get reading. …
Continue reading “CISA cyber security advisories – exploits, cisco devices, Firefox”
Microsoft Exchange attacked again
We live in a Microsoft world when it comes to business – and Microsoft Exchange, whether hosted or your own servers, by their very nature contain information that hacker love or are a way into an organisation. So they are always going to be a target: UNC3524: Eye Spy on …
Russia Ukraine hacking – remember malware can easily spread across the internet missing its intended target…
When you have moment this weekend – you should spend a little time to understand the impact on cyber security the Russia Ukraine conflict is having. Here are a couple of articles from Wired UK and The Record that look at different aspects of the hacking conflict that is raging …