For a successful ransomware attack the threat actors have to get their malware onto a user’s computer inside the secure network. Posing as your IT support is one way to get in: Ransomware gangs pose as IT support in Microsoft Teams phishing attacks – BleepingComputer Social Engineering In this attack …
Back to Basics – The Collection IV
As 2024 draws to a close and we all start making plans for the holiday season, I thought it would be a good idea to publish an updated list of all my Back to Basics cyber security primers as this week’s Wednesday Bit. These are easy read short series designed …
Why you need to protect your organisation’s M365 credentials
We have had to deal with several incidents of Business Email Compromise (BEC), where for one reason or another someone has had their Microsoft credentials compromised and a threat actor has got inside their email. It is a serious problem because threat actors make a lot of money from it. …
Continue reading “Why you need to protect your organisation’s M365 credentials”
Phishing network disrupted
Phishing attacks are repeatedly shown to be the number one cyber security risk for organisations in the UK – see the report linked below. So, anything that disrupts the threat actor’s ability to carry out and exploit these types of cyber-attacks is good news for everyone. Microsoft and the US …
Problems with QR Codes
Diana has written this week’s “Wednesday Bit” on QR Codes. Last week I became aware of a significant problem with QR codes, which are used by many organisations and individuals to direct people to their websites or sales pages. Such codes have been in use now for many years. (BizTechReports, …