This morning, I have released a new blog post on our training site CyberAwake about how to work securely from anywhere. The choice of hot beverage is yours.
Maybe this attack may not target my readers, but you never know?
The is active attack running on the internet at the moment targeting the CEOs and CFOs of some of the biggest companies around. These threat actors are not looking for targets of opportunity, for the work they put in they only want targets that can return millions of Pounds or …
Continue reading “Maybe this attack may not target my readers, but you never know?”
And here is another phishing attack story – have you visited CyberAwake.co.uk yet?
I have just written about this supply chain cyber attack: Developer software repositories will always be a prime target for threat actors – Smart Thinking Solutions And here is another phishing attack hunting for the unwary who will reveal their credentials: DoorDash customer info exposed in Oktapus phishing attack • …
Software repositories are a target for threat actors
If you, as a threat actor, could embed your malware into a software module, that is then used by many innocent and unaware software developers in their packages, they release to the general public, wouldn’t you? That looks like a lot of infected machines for a small amount of work. …
Continue reading “Software repositories are a target for threat actors”
Block or Square they still suffered an insider data leak now they have to face the consequences…
The issue of a trusted insider betraying a trust either maliciously or for commercial gain is a problem we often discussed at university and never really came up with an answer. You need trusted people for any business to operate – you should use the “principle of least privilege” to …