I write a lot about phishing emails and social engineering attacks, because it is probably the way threat actors could most easily get malware inside your defences and from there compromise your security, your information and ultimately your wallet! The Berkshire based construction company, Interserve Group Ltd, with an employee …
Mis-configuration – a common mistake many organisations make when setting up their cyber security – including Microsoft!
We often find problems with client configurations when we take over jobs, particularly when less-technically-able client try to do-it-themselves. If anyone needs an example as to why getting things set up correctly is difficult, Microsoft made a mistake with a server config and exposed some of their client’s information: Microsoft …
Data Sovereignty. You should get involved…
So I have just finished reading this piece, on The Register: Just how critical is data sovereignty? • The Register It is sponsored by Intel and is collecting research information on how organisations think about their data sovereignty. Not sure what data sovereignty is? Here is an example, you collect …
Continue reading “Data Sovereignty. You should get involved…”
NHS August ransomware attack – data was stolen as well
Advanced, the NHS supplier at the centre of the August cyber-attack, were quick to go to press with their success of containing and limiting the reach of the ransomware attack. However now, after a considered investigation, whilst confining the attack, the threat actors exfiltrated data from the systems: It was …
Continue reading “NHS August ransomware attack – data was stolen as well”
The Optus hack – UPDATED 29 September 2022
I started writing about this hack on 27 September 2022 Update 29 September 2022 Here is the take from the BBC: Optus: How a massive data breach has exposed Australia – BBC News Update 28 September 2022 This is becoming a very odd story – millions of bit of personal …
Continue reading “The Optus hack – UPDATED 29 September 2022”
