I am often asked how threat actors get their malicious packages past both the latest technical monitoring and a well-trained staff. The quick answer is the hackers are always looking for and changing to new attack vectors – such as this one: MalDoc in PDFs: Hiding malicious Word docs in …
The wrong way to manage security patches…
…let the UK Government scrutinise your security patches before you are allowed to publish them to your vulnerable customers! Sounds like a bad dream. Read on. Security Patches are Important Alarm surrounds a clause in the UK’s Investigatory Powers Act. According to the proposed legislation, tech firms will be mandated …
Continue reading “The wrong way to manage security patches…”
Because It’s Friday – Star Wars
This Hubble image was first released by NASA for the release of “Star Wars Episode VII: The Force Awakens,” in December 2015. It is an Herbig-Haro (HH) object – this one is HH24 – and is located in the Orion B molecular cloud complex, located 1,350 light-years away from Earth. …
Ransomware will always be changing – so does your response
As cyber security professionals come to understand the current ransomware threat and vendors and MSPs provide services and training to deal with the threat – the threat actors will always change their tactics. Here is one of the latest – using torrents to extract data from compromised systems: Clop ransomware …
Continue reading “Ransomware will always be changing – so does your response”
Microsoft Office under attack… again…
So most organisations use Microsoft Office in some way. Even if it they do not use it, someone will email them a Word or Excel document. You cannot avoid it – even on a Mac or Linux computer. That makes it a juicy target for threat actors – there are …