As you probably know, if you follow this blog, I was in Edinburgh last week at the 6th Intl. Conference on Big Data, Cybersecurity & Critical Infrastructure held at the Craiglockhart Campus, Edinburgh Napier University. For my post this week I wanted to share one positive thing I got from …
Stealing your data is a priority for threat actors
There is a highly completive market evolving to provide threat actors with malware that evades detection and then as quietly as possible exfiltrate sensitive data from the compromised system. This can include, cookies, session cookies, credentials, credit card and crypto-wallet data etc. The new info-stealing malware operations to watch out …
Continue reading “Stealing your data is a priority for threat actors”
What can be stolen in a cyber attack
Capita the largest business process outsourcing company in the UK was breached (read about that here). The company is now having to advise it’s clients that their data was stolen and personal data of their clients is in the hands of threat actors. Capita warns customers they should assume data …
What to do if you think you have malware on you PC…
…and a good news story about Facebook. The information stealing malware, NodeStealer spotted by the Facebook security team stealing Facebook user information and hijacking accounts – so they stepped in and blocked it. Facebook disrupts new NodeStealer information-stealing malware (bleepingcomputer.com) The malware exfiltrated session cookies from a range of the …
Continue reading “What to do if you think you have malware on you PC…”
You have protection – hackers have evasion
In a forth coming article about our new Security Operations Centre (SOC-as-a-Service), I discuss the different between passive protection – which you must have – and reactive, continuous 24/7 Cyber Security Monitoring. This article from Bleeping Computer illustrates how threat actors carefully take apart the protection you are using to …
Continue reading “You have protection – hackers have evasion”