Anatomy of a phishing email attachment – this is why we are always running training

Social Engineering and Email Cyber Security Training

SANS Internet Storm Centre has a couple of blog posts looking at the mechanics of a Word document and a PDF both of which are malicious payloads in a phishing email. This is what you are up against! Analyzing a Phishing Word Document – SANS Internet Storm Centre Simple PDF …

Java vulnerabilities to look out for – Spring4Shell – UPDATE 23 April 2022

This story was first published on 31 March 2022 and Updated on 5 April 2022 Update 26 April 2022 There has been a steady increase in the number of active attacks against this and related vulnerabilities: Hackers hammer SpringShell vulnerability in attempt to install cryptominers | Ars Technica This is …

What can a hacker do? Swap your BTC address for theirs, when you copy and paste!

crypto-currencies bitcoin

If you do not know what a BTC address is then this this particular demonstration of of a Python hack will not impact you. If you do use bitcoin or other cryptocurrency then have a look at this SANS blog by Xme: Multi-Cryptocurrency Clipboard Swapper – SANS Internet Storm Centre …