There was a time when Mac users would happily tell Windows users that there were no viruses for Mac! At the time those Mac users were few and far between if you were not in the print and design world. Now of course there are many potential victims using macOS …
Ransomware and the Phishing Email
There has been some very high profile international cases of organisations getting infected with ransomware. Especially active is the LockBit gang. LockBit ransomware infection hits Japan’s top cargo port • The Register TSMC says IT supplier extorted by LockBit • The Register We should assume these organisations – a world …
So you are technically smart…
…it doesn’t mean you cannot be a cyber crime victim. Putting you under-pressure or approaching you when you are under stress is a classic way threat actors successfully exploit their victims. Here is an example on the BBC of such an attack: The robotic falcon maker who lost £100,000 to …
The anatomy of a spear phishing attack
A spear phishing attack is a malicious email (usually) with content aimed to exploit the specific recipient. Yee Ching Tok, over on SANS Internet Storm has an excellent article taking apart a spear phishing email targeting YouTube content creators. Analyzing a YouTube Sponsorship Phishing Mail and Malware Targeting Content Creators …
Why team training has to be part of your cyber security plan?
We all have the best technical cyber security defences in place we can afford (or we should have). The threat actors know this so they are always on the hunt for those techniques that our anti-virus and filtering systems cannot detect. PowerShell is a powerful Windows command line and automation …
Continue reading “Why team training has to be part of your cyber security plan?”