Threat actors will always go after any vulnerabilities in popular products. Popular means more chance that some users somewhere will not have bothered to install the security patches. Do you use Microsoft 365 – we do, as do many of our clients. So perhaps it is time for you to …
Something for the holidays
The holiday season is drawing to a close, but this scam that Bruce Schneier writes about will work at any time of the year. Baggage Tag Scam – Schneier on Security Your Takeaway This type of cyber-attack involving something that you should keep private, but you let get into the …
Ransomware the Next Steps (pt.2)Â
In the first part of this article on how ransomware has changed, we looked at the actual attacks, today we are going to look at ransomware payments. Ransomware. Pay up? In the early days of ransomware, paying for the decryption key was an option. Although back then most people who …
Ransomware Warnings
Yesterday I wrote about the continuing malicious development of ransomware as part of my Wednesday Bit series: Ransomware the Next Steps (pt.1) As you can see that was part 1, I will be continuing the article next week looking at the changing landscape of ransomware. But for now let me …
Ransomware the Next Steps (pt.1)Â
Ransomware is probably the most well known of the modern cyber security threats, regularly making the mainstream press when high profile organisations and/or large numbers of users are compromised by the actions of cyber-criminals (BBC News, 2025). When ransomware began… I can remember the first time we had to deal …
