For a successful ransomware attack the threat actors have to get their malware onto a user’s computer inside the secure network. Posing as your IT support is one way to get in: Ransomware gangs pose as IT support in Microsoft Teams phishing attacks – BleepingComputer Social Engineering In this attack …
“I have a Mac – I’m secure!”
I am sure I am not alone in having heard this one from clients in the past. It was not true then and fortunately now Mac users now they are at as much risk of a cyber attack as a Windows, Linux, Android, etc. user. This malware attack uses a …
Email Encryption
Today’s Wednesday Bit is a guest article by Martin from Octagon Technology, looking at email encryption and Microsoft 365. Ever thought about why you would need to encrypt an email? Well here is a scenario. If I am sending an email that has proprietary information in it and I don’t …
VPN – A Security Uplift
On Monday we ran an article highlighting the importance of security updates and patches on VPN software, especially when those fixes apply to zero-day vulnerabilities. Quick Definition The zero-day vulnerability is the gap between a cyber security flaw being discovered and the patch to fix it being applied to your …
Tomorrow is Patch Tuesday
Among the patches Microsoft will issue tomorrow, there are sure to be fixes for zero-day vulnerabilities – these are probably the most important as threat actors may already be exploiting them. What is the zero-day threat? You can find out the details here: Are zero-day vulnerabilities exploited? Yes, and the …