This is a continuation of last week’s article that looked at stealth malware infection from a malicious phishing email. Phishing Emails I spend a lot of my time writing and talking about malicious phishing emails. It is the easiest attack vector into your organisation that a threat actor has access …
Windows 11 to get extra phishing protection
This is only being released to the Windows Insider programme at the moment but if it is will get to the general release soon. Windows 11 gets phishing protection boost and SHA-3 support (bleepingcomputer.com) It is designed to protect your credentials, alerting you if you are about to carry out …
Continue reading “Windows 11 to get extra phishing protection”
OneNote – the threat actors new best friend…
Once it had been discovered how straightforward it is to obscure a malicious package inside a OneNote .one attachment and mixed with “something new”, that users may not have seen before, it was obvious that the use of .one attachments for the delivery of malware was going to go up. …
Continue reading “OneNote – the threat actors new best friend…”
The thefts have started – The SVB collapse…
Following my article earlier this week to warn you to be on the look out for scams – theft attempts – based around the collapse of the Silicon Valley Bank (SVB), Bleeping Computer is reporting that the cybercriminals are actively exploiting the situation looking to steal money and data: Cybercriminals …
Continue reading “The thefts have started – The SVB collapse…”
One of the top cyber security threats has some new tricks
The Emotet botnet comes and goes, but it is still one of the top cyber security threats active today. Its flexibility and updates have kept it in use by threat actors whilst other malware has been defeated by cyber security defences. The latest versions are still arriving in phishing emails, …
Continue reading “One of the top cyber security threats has some new tricks”