We are always insisting that our clients always use multi-factor authentication (MFA) for absolutely every service they use. It is a prerequisite of any client we manage Microsoft 365 for that MFA is activated and enforced for everyone of their users. However, of course, there are ways that hackers exploit …
Do you know what an .xlsb file is? The hackers do and it is another way to obscure their malicious payloads
Here is yet another email attachment, examined by Xme, at SANS Internet Storm and for you to look out for: XLSB Files: Because Binary is Stealthier Than XML – Sans Internet Storm Centre For phishing attacks to succeed the hackers need to exploit your trust – for them to fail …
Scam emails – fake help for Ukraine
Watch out for these: Deplorable scam emails fake fundraising for Ukraine – BBC News If you want to help the victims in Ukraine then go directly through a reputable charity website.
The most feared Russian cyber attacks. What should be your first two steps in defending against them if they spread to you?
Included on this list from the BBC is the WannaCry ransomware, that hit the NHS in 2017 – so we all know how much chaos that can spread. Since 2017 the sophistication of the cyber criminal gangs and the malware they are using has increased. The three Russian cyber-attacks the …
Be very careful when you log-in online – things may not be what they seem
This browser-in-the-browser (BitB) is a technique for deceiving the user into thinking they are using a legitimate online login screen, such as when you log in to Microsoft 365 or Google Workspace. This browser-in-the-browser attack is perfect for phishing • The Register Behold, a password phishing site that can trick …
Continue reading “Be very careful when you log-in online – things may not be what they seem”