This story has gone back and forth. How can Microsoft wobble on what has been a well used attack vector, by threat actors for years and years? Microsoft to block downloaded Office macros – at last – Smart Thinking Solutions Oh No! Microsoft appears to have rolled back it’s macro …
OpenDocument files distributing stealth malware – make sure your team can recognise these types of attack.
This report is from HP’s Threat Research Blog and is about a threat discovered impacting hotels in South America. But it illustrates the wide range of threats that can get to you via an email attachment and has some examples you can look at. Stealthy OpenDocument Malware Deployed Against Latin …
I have told everyone to use MFA so I do not need to think about more cyber security! UPDATED 14 July 2022
This post was original published on 27 June 2022 Update 14 July 2022 Here is an article from the Microsoft Threat Intelligence Center (MSTIC) and the Microsoft 365 Defender Research Team outlining how the big phishing campaigns backed by experienced and skilled hackers can bypass the security of multi-factor authentication: …
More and more phishing attacks – each with their own special touch to exploit the trust of your people!
A UK Government’s report looking at cybersecurity breaches across the country, (UK Government. 2022), prepared by Department for Digital, Culture, Media & Sport (and sport!) showed clearly email phishing is a real threat: “Of the 39% of UK businesses who identified an attack, the most common threat vector was phishing …