When you improve your defences – the hackers change their tactics

Patches and Updates

Following up on the two articles I posted yesterday, to give you an awareness of the threat landscape, here are two articles discussing how that landscape is constantly changing. Criminals adopting new methods to bypass improved defenses • The Register Cybercriminals are finding new ways to target cloud environments | …

BlackCat ransomware tracked to at least 60 victims

This was the ransomware that hit universities over the past weeks: Universities as targets – Smart Thinking Solutions The FBI has released a statement outlining other attacks of BlackCat ALPHV and the attack vectors and strategies the gang has been using. It includes suggested mitigation. BlackCat/ALPHV Ransomware Indicators of Compromise …

Yes people do track a top ten for malware. Do you want to know what the #1 is?

It’s Emotet – this is obviously where the cyber-criminals are making their money. Emotet reestablishes itself at the top of the malware world • The Register Emotet is operated by an operation called Cryptolaemus, and they have been developing the code to bring the malware back after it had been …

Do you have a Lenovo laptop? If so then this post is for you.

Some persistent and critical vulnerabilities have been discovered in Lenovo laptops – so check if yours is on the list. When “secure” isn’t secure at all: High‑impact UEFI vulnerabilities discovered in Lenovo consumer laptops | WeLiveSecurity Lenovo Notebook BIOS Vulnerabilities – Lenovo Support US If you need help fixing this …