…it doesn’t mean you cannot be a cyber crime victim. Putting you under-pressure or approaching you when you are under stress is a classic way threat actors successfully exploit their victims. Here is an example on the BBC of such an attack: The robotic falcon maker who lost £100,000 to …
The anatomy of a spear phishing attack
A spear phishing attack is a malicious email (usually) with content aimed to exploit the specific recipient. Yee Ching Tok, over on SANS Internet Storm has an excellent article taking apart a spear phishing email targeting YouTube content creators. Analyzing a YouTube Sponsorship Phishing Mail and Malware Targeting Content Creators …
Why team training has to be part of your cyber security plan?
We all have the best technical cyber security defences in place we can afford (or we should have). The threat actors know this so they are always on the hunt for those techniques that our anti-virus and filtering systems cannot detect. PowerShell is a powerful Windows command line and automation …
Continue reading “Why team training has to be part of your cyber security plan?”
Explain to me what a phishing email looks like?
This is something I try and explain at every cyber security awareness session I run – what is a phishing email? The answer is constantly changing as the threat actors never stand still in their attempts to get us to infect our own computers. I used to point to bad …
Continue reading “Explain to me what a phishing email looks like?”
New info stealing malware
Bandit Stealer malware is promoted by the hacker developers as the most advanced information stealer available to threat actors. It can exfiltrate data from most popular browsers including usernames and cookies and other system information such as IP addresses and details of a victim’s computer. The Telegram messaging app is …