As computing power increases and the ability of cloud platforms and software to create realistic deepfake impersonations of people improves, so does the increased use of such techniques by threat actors – of course. Here are a couple of articles looking at the technology and the threat: Seeing is disbelieving: …
I refer you to yesterday’s blog post…
Another report of Android malware getting into the play store: Fake antivirus, Sharkbot circles back onto Google Play store | NCC Group Newsroom (mynewsdesk.com) Do you have a position on Android devices and their use by your team when they are processing your information on them? You should have! Yesterday’s …
Conti – the cyber gang that is never far from the action
It seems no one is really sure the status of the Conti Cyber Gang – except to say that they are still a threat, whatever they are doing. Conti’s blockchain plans: an ominous prospect | NCC Group Newsroom (mynewsdesk.com)
Research that shows it is possible to hack an iPhone when it is turned off and drive off in your Tesla – UPDATED 18 May 2022 with real world examples of Bluetooth vulnerabilities
This is theoretical research that shows it may be possible to run malware on an iPhone that is still active even when the phone is powered off, by abusing a lack of authentication in the Bluetooth system and the fact that the Bluetooth is used in the Apple “find my…” …
Hive is the most active ransomware gang at the moment – and ransomware attacks are on the increase
This report from NCC Group about the state of cyber attacks for March 2022 shows the continuing rise of ransomware attacks across the United States and Europe. With the Hive ransomware gang emerging as one of the greatest threats. NCC Group Monthly Threat Pulse – March 2022 | NCC Group …