CyberAwake has published a follow-up article to my previous article on Cyber Security Culture. It looks at what you need to think about when it comes to the meetings following an incident: Cyber Security Incident Follow-up Meetings – (cyberawake.co.uk) How you approach these meeting can have a huge impact on …
The Anatomy of a Malicious Word Document
If you want to know what a malicious phishing email and Word document looks like and how it functions, have a read of this article by Xavier Mertens on SANS Internet Strom. Infostealer Embedded in a Word Document – SANS Internet Storm Center It uses a simple technique to get …
WordPress plugin vulnerability
A vulnerable WordPress plugin is in the news. The Advanced Custom Fields plugin needs to be updated or your site is vulnerable: WordPress plugin flaw puts ‘millions of websites’ at risk • The Register If you use this get it updated now. Do you know if your website uses this …
What to do if you think you have malware on you PC…
…and a good news story about Facebook. The information stealing malware, NodeStealer spotted by the Facebook security team stealing Facebook user information and hijacking accounts – so they stepped in and blocked it. Facebook disrupts new NodeStealer information-stealing malware (bleepingcomputer.com) The malware exfiltrated session cookies from a range of the …
Continue reading “What to do if you think you have malware on you PC…”
Ransomware is still the top threat…
Another school has been hit by ransomware. They tend to be soft targets for threat actors as they use a range of predictable applications, their IT teams are not large, IT tends not to be a priority and they have a large group of potential victims for phishing emails etc. …