…you might just give the threat actors your Google credentials. A malware campaign, detected by OALABS researchers, locks your web browser into “kiosk mode” and asks you for your Google credentials to unlock it. Of course, the malware then steals those credentials. Malware locks browser in kiosk mode to steal …
Another thing about phishing emails… (pt.12)
A few months ago, I wrote a Back-to-Basics mini-series on phishing emails, how they impact organisations and what you can do to reduce the risks. Back-to-Basics – A Phishing Email Primer | Smart Thinking Solutions Phish Attacks – the deluge never stops Every week I read articles on the latest …
Continue reading “Another thing about phishing emails… (pt.12)”
Stuff happens
On September 4, Tewkesbury Borough Council declared a major IT incident and shut down its systems and enacted their incident response plan. It now turns out that this incident was not a cyber-attack but an error in user accounts. However this does not matter. There was and is inconvenience to …
A real world QR code scam
I wrote about QR Code and cyber security over on CyberAwake back in June. Now BleepingComputer is reporting on “Your Boyfriend cheated” posters, which include a QR code and have been put up across the UK. Clickbaity or genius? ‘BF cheated on you’ QR codes pop up across UK (bleepingcomputer.com) …
Why Cyber Security Awareness Training is Importatnt?
Whatever technical defences you (and I) rely on, there is a probability that the threat actors will find ways to bypass them: Microsoft 365 anti-phishing feature can be bypassed with CSS (bleepingcomputer.com) If the phishing email gets as far as your team member’s inbox, they had better be able to …
Continue reading “Why Cyber Security Awareness Training is Importatnt?”