And here is another phishing attack story – have you visited CyberAwake.co.uk yet?

I have just written about this supply chain cyber attack: Developer software repositories will always be a prime target for threat actors – Smart Thinking Solutions And here is another phishing attack hunting for the unwary who will reveal their credentials: DoorDash customer info exposed in Oktapus phishing attack • …

Block or Square they still suffered an insider data leak now they have to face the consequences…

The issue of a trusted insider betraying a trust either maliciously or for commercial gain is a problem we often discussed at university and never really came up with an answer. You need trusted people for any business to operate – you should use the “principle of least privilege” to …

Android malware has already circumvented new OS security features

Android devices

Threat actors invest time and effort into beating security measures, especially when the targets are so profitable. Android users have proven to be lucrative targets: Malware devs already bypassed Android 13’s new security feature (bleepingcomputer.com) Make sure you have policies and procedures in place if your team are BYODing Android …