Pendragon car dealer refuses $60 million LockBit ransomware demand (bleepingcomputer.com) I do not have any login details with them, just some credit card stuff and other financial information. Of course, they also know all about my car. I wonder if anything to do with the wireless key security has been …
A phishing email leads to a £4.4m fine
I write a lot about phishing emails and social engineering attacks, because it is probably the way threat actors could most easily get malware inside your defences and from there compromise your security, your information and ultimately your wallet! The Berkshire based construction company, Interserve Group Ltd, with an employee …
Mis-configuration – a common mistake many organisations make when setting up their cyber security – including Microsoft!
We often find problems with client configurations when we take over jobs, particularly when less-technically-able client try to do-it-themselves. If anyone needs an example as to why getting things set up correctly is difficult, Microsoft made a mistake with a server config and exposed some of their client’s information: Microsoft …
Data Sovereignty. You should get involved…
So I have just finished reading this piece, on The Register: Just how critical is data sovereignty? • The Register It is sponsored by Intel and is collecting research information on how organisations think about their data sovereignty. Not sure what data sovereignty is? Here is an example, you collect …
Continue reading “Data Sovereignty. You should get involved…”
NHS August ransomware attack – data was stolen as well
Advanced, the NHS supplier at the centre of the August cyber-attack, were quick to go to press with their success of containing and limiting the reach of the ransomware attack. However now, after a considered investigation, whilst confining the attack, the threat actors exfiltrated data from the systems: It was …
Continue reading “NHS August ransomware attack – data was stolen as well”