Roaming Mantis targets both Android and Apple iOS. But there are more malicious apps out there than you probably realise…

apple iphone and google android phones

The threat actor Roaming Mantis has been detected since February, targeting victims across Europe and the Far East. Their attacks are based around phishing text messages, Android users are directed to download a malicious app, whilst Apple users (as the Apple “walled garden” Apps store does an effective job of …

More warnings about the possible spread of the Russian Ukraine cyber-conflict and NATO members are targets.

The European Union (EU) has issued a warning about the measurably increase in the volume of Russian cyber-attacks associated with the Russia Ukraine conflict and how these attacks can easily spread to other regions. Nations that actively support Ukraine, with whatever resources, are likely to be “at risk” of this …

How secure is your WordPress website and blog? Do you even know if your organisation’s website is built on WordPress?

WordPress website claim makes it a BYOD risk

There has been a flurry of WordPress security and vulnerability articles over the past week or so. It is no surprise that the world’s most popular website builder is a target for threat actors, especially as Automatic’s core code can be added to with third-party, open-source or even self-written plugins, …

Here is the reason why patching and updating of any software is essential. Do you want the reassurance that all the updates are being completed across your organisation?

Patches and Updates

This is a description of how a vulnerability in the Microsoft Windows Network File System (NFS) could be exploited – which was discovered by Trend Micro Vulnerability Research Service. Zero Day Initiative — CVE-2022-30136: Microsoft Windows Network File System v4 Remote Code Execution Vulnerability This vulnerability was patched in Microsoft’s …

Industrial systems as targets for threat actors – this why you need a software policy. Do you have one?

Masterclass September 2022

Industrial systems, large and small run on computers – so why not attack them? So here is the scenario – which Octagon has had to deal with in the past – someone leaves and forgets to leave the password for a system that is accessed only occasionally. You cannot contact …