If you want to know what a malicious phishing email and Word document looks like and how it functions, have a read of this article by Xavier Mertens on SANS Internet Strom. Infostealer Embedded in a Word Document – SANS Internet Storm Center It uses a simple technique to get …
Phishing emails – can you recognise them?
Phishing emails with a carefully scripted social engineering message, a malicious .pdf file with links to malware stored in Firebase Storage on Google. Brad Duncan on SANS InfoSec Handlers Diary Blog has the full story including screenshots of the phishing email and the steps to infection: Recent IcedID (Bokbot) activity …
Continue reading “Phishing emails – can you recognise them?”
What would tech writers write about if ChatGPT did not exist?
ChatGPT has been used for homework, writing radio programmes, academic papers, articles, coding, hacking etc. etc. etc.. Here are some of the most recent articles examining privacy and cyber crime using artificial intelligence, of which the adapting, convincing email scams is probably the issue that organisations need to think about …
Continue reading “What would tech writers write about if ChatGPT did not exist?”
The Phishing Email – Just one click…
This is a continuation of last week’s article that looked at stealth malware infection from a malicious phishing email. Phishing Emails I spend a lot of my time writing and talking about malicious phishing emails. It is the easiest attack vector into your organisation that a threat actor has access …
Scamming the Hackers
Here is a good news cyber security story: UK National Crime Agency reveals it ran fake DDoS-for-hire sites to collect users’ data (therecord.media) When enquiring about buying distributed denial of service attacks, the hackers were duped into giving their information to law enforcement. An excellent example of social engineering – …