On his own confession – Nick clicked on a link in what looked like a genuine email from X and then lost control of his account. The email had explained that he had made a post that had violated X’s rules and his account was going to be closed – …
Ransomware never goes away
For a successful ransomware attack the threat actors have to get their malware onto a user’s computer inside the secure network. Posing as your IT support is one way to get in: Ransomware gangs pose as IT support in Microsoft Teams phishing attacks – BleepingComputer Social Engineering In this attack …
Back to Basics – The Collection IV
As 2024 draws to a close and we all start making plans for the holiday season, I thought it would be a good idea to publish an updated list of all my Back to Basics cyber security primers as this week’s Wednesday Bit. These are easy read short series designed …
Why you need to protect your organisation’s M365 credentials
We have had to deal with several incidents of Business Email Compromise (BEC), where for one reason or another someone has had their Microsoft credentials compromised and a threat actor has got inside their email. It is a serious problem because threat actors make a lot of money from it. …
Continue reading “Why you need to protect your organisation’s M365 credentials”
Phishing network disrupted
Phishing attacks are repeatedly shown to be the number one cyber security risk for organisations in the UK – see the report linked below. So, anything that disrupts the threat actor’s ability to carry out and exploit these types of cyber-attacks is good news for everyone. Microsoft and the US …