OK it was part of my Master course, and it was an attack against a sand-boxed compromised server, and the malware, to be honest, would not last a moment in the real world with the current state of the art when it comes to protecting customer payment information. However the …
VMWare is a real cyber security issue – fix it or get rid of it CISA warns
This is pretty simple – do you use VMWare if so get it patched or change it. The Spring Cloud framework vulnerability is proving a honey pot for attackers. CISA issues directive for exploited VMware bug after IR team deployed to ‘large’ org – The Record by Recorded Future Patch …
Continue reading “VMWare is a real cyber security issue – fix it or get rid of it CISA warns”
Just how much and often is your data shared? UPDATED 19 May 2022
This post was originally published on 17 May 2022 Update 19 May 2022 The numbers just keep getting bigger! This article in The Register, has the Irish Council on Civil Liberties, stating that our data is shared up to 987 times a day, when the Real Time Bidding (RTB) industry …
Continue reading “Just how much and often is your data shared? UPDATED 19 May 2022”
Research that shows it is possible to hack an iPhone when it is turned off and drive off in your Tesla – UPDATED 18 May 2022 with real world examples of Bluetooth vulnerabilities
This is theoretical research that shows it may be possible to run malware on an iPhone that is still active even when the phone is powered off, by abusing a lack of authentication in the Bluetooth system and the fact that the Bluetooth is used in the Apple “find my…” …
The insider risk
We have a training session that just covers the issue of what happens when a trusted member of your team goes rogue, either by accident or, worse, deliberately. This is the insider threat – an organisation cannot operate without trust and if that trust is abused what can you do. …