I think it is true to say no one is sure what is happening to the Conti cyber criminal gang – other than, following the leak of it’s information earlier in the year, it has fractured. Son of Conti: Ransomware tries its hand at politics – The Record by Recorded …
Why we do not recommend USB memory sticks as data storage for our clients
It has been a long standing thing at Octagon Technology that we advise our clients not to store important data on memory sticks – as they are easily lost: Japanese man loses USB stick with entire city’s personal details – BBC News By not allowing the use of USB sticks, …
Continue reading “Why we do not recommend USB memory sticks as data storage for our clients”
Has the Conti Ransomware Gang finally stopped operating?
Research and analysis is showing that the malicious websites run by the Conti Gang to support it’s ransomware operations are now closed: Conti ransomware finally shuts down data leak, negotiation sites (bleepingcomputer.com) However the threat actors have not gone away – ransomware makes too much money for them to simply …
Continue reading “Has the Conti Ransomware Gang finally stopped operating?”
Google Threat Assessment Group tackles smartphone malware
This is a follow-up to last week’s story: New commercial spyware for phones – Smart Thinking Solutions This is Google describing how they countered the Hermit smartphone malware and discusses their Project Zero for countering zero-day threats. Spyware vendor targets users in Italy and Kazakhstan (blog.google) Your best defence against …
Continue reading “Google Threat Assessment Group tackles smartphone malware”
How does ransomware get into my system? I’m careful!
Of course the threat actors use social engineering techniques and phishing emails: Fake copyright infringement emails install LockBit ransomware (bleepingcomputer.com) Ransomware is probably the biggest cyber security threat facing businesses today. Coming soon: Five essential skills you need to do your own cybersecurity – A Masterclass Are you facing cyber …
Continue reading “How does ransomware get into my system? I’m careful!”