The stakes can be high when threat actors invest the time and money into creating deepfake videos to hack an organisation, here an example from last year: You may not have $25m in your bank account but here is the state of play of deepfake hacking So tools that can …
Signalgate
I am not sure anyone is actually calling it that… We have all seen and or heard of this story that is running in the US and around the world: Trump and intelligence chiefs play down Signal group chat leak – BBC News I am not going to get into …
Zero-day vulnerabilities – it is a real threat
Each month when I write about Microsoft Patch Tuesday or Apple updates, in the Further Reading section I include a link to my article explaining why the Zero-day threat is a real risk every organisation or individual faces when it comes to cyber security. Here is is again if you …
Continue reading “Zero-day vulnerabilities – it is a real threat”
Hackers target security software
We all depend on the various technical cyber security solutions we deploy, firewalls, anti-virus, end point detection and response (EDR), there are many names and the threat actors know we depend on them. So it should come as no surprise that there are attacks, that first attempt to disable these …
Keep control of your information
I have implemented information control for one-person organisations – because even a small organisation will have some need to share information with other people and organisations. It is an essential step in any IT and Cyber Security Audit to examine who, has access to what information and what steps are …