It is obvious but even the biggest organisations and governments in the world will be responding slower that the threat actors – so there will always be gaps in the cyber security. Hackers scan for vulnerabilities within 15 minutes of disclosure (bleepingcomputer.com) Here is a real world example of a …
And we thought blocking Microsoft Office macros was a good idea – but close one door to the threat actors and of course they find another way to get to you…
Research is showing that with Microsoft now blocking Office VBA macros from the internet, threat actors are moving to other attachments that can execute malicious instructions, such as Windows Shortcut .lnk, .iso and .rar. As Microsoft blocks Office macros, hackers find new attack vectors (bleepingcomputer.com) My advice: Make sure your …
Phishing-as-a-Service – called “Robin Banks” you know it is going to be trouble.
Phishing attacks are highly successful for threat actors, now they can be executed by gangs with less technical ability as they can buy it in: New ‘Robin Banks’ phishing service targets BofA, Citi, and Wells Fargo (bleepingcomputer.com) You need to be ready
Windows Calculator as an attack vector
Threat actors have to find a way to get their malware onto your systems – phishing emails is an obvious method – Qakbot malware is the next step. This malware also known as Qbot, has been found to be to be intermediate software used by threat actors to infect victim’s …