Why does the Capita data breach have something to teach every organisation about cyber security? When a company has many clients for whom they do so many things, it stands to reason that threat actors will take an interest. One breach and the criminals get access to a wide range …
Email Phishing is a constantly changing threat
One of the topics covered at the cyber security conference I was at last week was how AI tools such as ChatGPT are helping threat actors refine the social engineering messages that enable the success of an email phishing attack. Our Cyber Security Awareness Training still includes looking out for …
Continue reading “Email Phishing is a constantly changing threat”
The Anatomy of a Malicious Word Document
If you want to know what a malicious phishing email and Word document looks like and how it functions, have a read of this article by Xavier Mertens on SANS Internet Strom. Infostealer Embedded in a Word Document – SANS Internet Storm Center It uses a simple technique to get …
Ransomware is still the top threat…
Another school has been hit by ransomware. They tend to be soft targets for threat actors as they use a range of predictable applications, their IT teams are not large, IT tends not to be a priority and they have a large group of potential victims for phishing emails etc. …
Phishing emails – can you recognise them?
Phishing emails with a carefully scripted social engineering message, a malicious .pdf file with links to malware stored in Firebase Storage on Google. Brad Duncan on SANS InfoSec Handlers Diary Blog has the full story including screenshots of the phishing email and the steps to infection: Recent IcedID (Bokbot) activity …
Continue reading “Phishing emails – can you recognise them?”