The European Union (EU) has issued a warning about the measurably increase in the volume of Russian cyber-attacks associated with the Russia Ukraine conflict and how these attacks can easily spread to other regions. Nations that actively support Ukraine, with whatever resources, are likely to be “at risk” of this …
How secure is your WordPress website and blog? Do you even know if your organisation’s website is built on WordPress?
There has been a flurry of WordPress security and vulnerability articles over the past week or so. It is no surprise that the world’s most popular website builder is a target for threat actors, especially as Automatic’s core code can be added to with third-party, open-source or even self-written plugins, …
Here is the reason why patching and updating of any software is essential. Do you want the reassurance that all the updates are being completed across your organisation?
This is a description of how a vulnerability in the Microsoft Windows Network File System (NFS) could be exploited – which was discovered by Trend Micro Vulnerability Research Service. Zero Day Initiative — CVE-2022-30136: Microsoft Windows Network File System v4 Remote Code Execution Vulnerability This vulnerability was patched in Microsoft’s …
Industrial systems as targets for threat actors – this why you need a software policy. Do you have one?
Industrial systems, large and small run on computers – so why not attack them? So here is the scenario – which Octagon has had to deal with in the past – someone leaves and forgets to leave the password for a system that is accessed only occasionally. You cannot contact …
OpenDocument files distributing stealth malware – make sure your team can recognise these types of attack.
This report is from HP’s Threat Research Blog and is about a threat discovered impacting hotels in South America. But it illustrates the wide range of threats that can get to you via an email attachment and has some examples you can look at. Stealthy OpenDocument Malware Deployed Against Latin …
