This is an excellent article, on TechRepublic, that is looking at how AI and deepfakes are compromising online payment processes: Protecting payments in an era of deepfakes and advanced AI | TechRepublic
More low-level cyber criminals joining in
Following Tuesday’s article showing how cyber gangs are distributing malware via a “gig economy model”, so getting very effective attacks into the hands of less skilled cyber gangs, here is the same idea but applied to the most basic of cyber attacks – card skimming. Credit card skimming services make …
Continue reading “More low-level cyber criminals joining in”
Remember paying the ransom will not always bring back the data – take steps now
If your back-up and incident response plan is completely useless, you could always fall back on just paying the ransom that the cyber criminals demand. A Sophos study showed 46% of businesses did this: Study: 90% of organizations say ransomware impacted their ability to operate | TechRepublic But this study …
Continue reading “Remember paying the ransom will not always bring back the data – take steps now”
Lapsus$ hits T-Mobile
T-Mobile is the latest in a string of high profile organisations targeted by the Lapsus$ gang. It is reported this time that they stole valuable source code. T-Mobile hit by data breaches from Lapsus$ extortion group | TechRepublic The operation appears to have originated with a social engineering attack directed …
When you improve your defences – the hackers change their tactics
Following up on the two articles I posted yesterday, to give you an awareness of the threat landscape, here are two articles discussing how that landscape is constantly changing. Criminals adopting new methods to bypass improved defenses • The Register Cybercriminals are finding new ways to target cloud environments | …
Continue reading “When you improve your defences – the hackers change their tactics”
Why you need to look at your cybersecurity risks and mitigations
Here are a couple of longer articles, that give you some idea into the scale of cyber security and information security responsibilities, owners, directors and senior managers face in the current threat landscape. Over 42 million people in the UK had financial data compromised | TechRepublic Report: Many SMBs wouldn’t …
Continue reading “Why you need to look at your cybersecurity risks and mitigations”
Software vulnerabilities, patches and updates are an important part of a “defence in depth” cyber security plan
US federal alert warns of the discovery of malicious cyber tools | US national security | The Guardian I use the Cybersecurity and Infrastructure Security Agency, (CISA) a lot. Many of the blog posts I run here, start there. However there is a vast amount of information on the CISA …