As computing power increases and the ability of cloud platforms and software to create realistic deepfake impersonations of people improves, so does the increased use of such techniques by threat actors – of course. Here are a couple of articles looking at the technology and the threat: Seeing is disbelieving: …
The Insider Threat – it may be at the top of the company…
I wrote about the insider threat to organisations last week: And today there is a story with an insider threat twist. The president of a Japanese Sushi company, Kobi Tanabe, has been arrested and accused of accessing information from his previous employer, through contacts and sub-ordinates who still work there. …
Continue reading “The Insider Threat – it may be at the top of the company…”
The “hidden in plain sight” cyber attack
Steganography When we were looking at steganography cyber attacks – hiding malicious code inside for instance image files – I was surprised just how much malware could be hidden without degrading the image. Here is a real-world example of this rare type if attack, spy are code embedded in a …
VPNs are an important part of any cyber security plan
The moment you step outside your secure office and want to work – or you need anonymity on the internet – a VPN is your go to solution for privacy and security. I have written an article for the blog on our cyber awareness and online training site CyberAwake looking …
Continue reading “VPNs are an important part of any cyber security plan”
The Optus hack – UPDATED 29 September 2022
I started writing about this hack on 27 September 2022 Update 29 September 2022 Here is the take from the BBC: Optus: How a massive data breach has exposed Australia – BBC News Update 28 September 2022 This is becoming a very odd story – millions of bit of personal …
Continue reading “The Optus hack – UPDATED 29 September 2022”