If you want to know what a malicious phishing email and Word document looks like and how it functions, have a read of this article by Xavier Mertens on SANS Internet Strom. Infostealer Embedded in a Word Document – SANS Internet Storm Center It uses a simple technique to get …
Ransomware is still the top threat…
Another school has been hit by ransomware. They tend to be soft targets for threat actors as they use a range of predictable applications, their IT teams are not large, IT tends not to be a priority and they have a large group of potential victims for phishing emails etc. …
Phishing emails – can you recognise them?
Phishing emails with a carefully scripted social engineering message, a malicious .pdf file with links to malware stored in Firebase Storage on Google. Brad Duncan on SANS InfoSec Handlers Diary Blog has the full story including screenshots of the phishing email and the steps to infection: Recent IcedID (Bokbot) activity …
Continue reading “Phishing emails – can you recognise them?”
What would tech writers write about if ChatGPT did not exist?
ChatGPT has been used for homework, writing radio programmes, academic papers, articles, coding, hacking etc. etc. etc.. Here are some of the most recent articles examining privacy and cyber crime using artificial intelligence, of which the adapting, convincing email scams is probably the issue that organisations need to think about …
Continue reading “What would tech writers write about if ChatGPT did not exist?”
The Phishing Email – Just one click…
This is a continuation of last week’s article that looked at stealth malware infection from a malicious phishing email. Phishing Emails I spend a lot of my time writing and talking about malicious phishing emails. It is the easiest attack vector into your organisation that a threat actor has access …