For a successful ransomware attack the threat actors have to get their malware onto a user’s computer inside the secure network. Posing as your IT support is one way to get in: Ransomware gangs pose as IT support in Microsoft Teams phishing attacks – BleepingComputer Social Engineering In this attack …
Back to Basics – The Collection IV
As 2024 draws to a close and we all start making plans for the holiday season, I thought it would be a good idea to publish an updated list of all my Back to Basics cyber security primers as this week’s Wednesday Bit. These are easy read short series designed …
Stuff happens
On September 4, Tewkesbury Borough Council declared a major IT incident and shut down its systems and enacted their incident response plan. It now turns out that this incident was not a cyber-attack but an error in user accounts. However this does not matter. There was and is inconvenience to …
Ransomware has not gone away
Just in case you thought that ransomware was a thing of the past or that the threat actors only went after big businesses, then think again: NoName ransomware gang deploying RansomHub malware in recent attacks (bleepingcomputer.com) The NoName ransomware gang has been targeting small and medium-sized businesses worldwide with its …
The state of ransomware
I have written a lot about updates and patches recently – let’s get back to another old favourite – ransomware. No surprise it is still a growth market for threat actors. Read about it in Unit 42’s bi-annual report: Ransomware Review: First Half of 2024 (paloaltonetworks.com) Your takeaway Simple – …