I have written many time about how threat actors are always looking for the human event that they can take advantage of – with no scruples! The bigger the event, the bigger the opportunity. They have no scruples so to them it does not matter that they are taking advantage …
Microsoft OneNote malware mitigation
I love OneNote – it is my go to, cross platform/cross device app (it even works on my watch!) so I have been watching the increasing threat actor activity using OneNote attachments with interest, as we all use OneNote her at Smart Thinking and Octagon and I have encouraged many …
CEO Fraud: Act quickly because your boss sent you this email…
…or did she? I got an email from Diana the other day asking me to transfer some company money to the listed account – because if I didn’t our Microsoft 365 account would be deleted. It also conveniently explained that she was in a meeting and could not be contacted …
Continue reading “CEO Fraud: Act quickly because your boss sent you this email…”
Exploitation and how to avoid it…
…just slow down. I often use the example of a successful social engineering/phishing email as one that arrives when you are under work pressure or just before before you want to leave for the weekend. Both are periods when the threat actors know your guard will be down – they …
How do hackers get into secure networks?
Here is a clue – social engineering. I am often asked this by clients, especially those who I am suggesting need to up their cyber security game. Here is a very good article by the cyber security expert Brian Krebs looking in detail at the recent high profile data breaches …