We all send and receive Microsoft Office documents, day in and day out, using email. It is how businesses and organisations work in a Microsoft Business World – even if you have a Mac or an iPad. So any attack vector that combine a Microsoft Word document with email is …
Our trust in public code – UPDATED 24 May 2022
The original post was made on 12 May 2022 Update 24 May 2022 Python is a popular coding language and many code libraries exist to make the programmer’s life a little easier. But as indicated in the articles below if that open source code becomes popular, then it also becomes …
Continue reading “Our trust in public code – UPDATED 24 May 2022”
Dangerous malware – it’s only function is to deceive you into clicking something…
Getting the word out to you, about the wide range of phishing emails and their associated social engineering tricks actually active in the wild, is one of the ain reasons this blog exists. Many of our clients use this blog as a resource as a link to the multitude of …
Continue reading “Dangerous malware – it’s only function is to deceive you into clicking something…”
More on Bumblebee malware – detailed attack examination
Following the emergence of Bumblebee malware as a significant threat, SANS INternet Storm has a post looking at the function of the malware and transferring ISO files. Bumblebee Malware from TransferXL URLs – SANS Internet Storm Centre This is an excellent post by Brad and not only shows you the …
Continue reading “More on Bumblebee malware – detailed attack examination”
Make money fast – the classic social engineering phishing campaign
I try and highlight the variety of social engineering phishing emails doing the rounds as awareness among your people about the ways they are having their trust exploited, when they check their email, is essential for them to beat the threat actors. Here is another one taken apart by the …
Continue reading “Make money fast – the classic social engineering phishing campaign”