Anatomy of a phishing email attachment – this is why we are always running training

Social Engineering and Email Cyber Security Training

SANS Internet Storm Centre has a couple of blog posts looking at the mechanics of a Word document and a PDF both of which are malicious payloads in a phishing email. This is what you are up against! Analyzing a Phishing Word Document – SANS Internet Storm Centre Simple PDF …

Yes people do track a top ten for malware. Do you want to know what the #1 is?

It’s Emotet – this is obviously where the cyber-criminals are making their money. Emotet reestablishes itself at the top of the malware world • The Register Emotet is operated by an operation called Cryptolaemus, and they have been developing the code to bring the malware back after it had been …