I published an article yesterday on CyberAwake looking at how gift cards are misused by threat actors: How Gift Cards are exploited by Cyber Criminals – CyberAwake
Threat actors are always on the lookout for ways to get to you
So a new trend going viral on a social media platform is an ideal place to interfere with and use to spread malware. Just like the “Invisible Body” challenge on TikTok: TikTok ‘Invisible Body’ challenge exploited to push malware (bleepingcomputer.com) Do not be deceived by the offer from the hackers …
Continue reading “Threat actors are always on the lookout for ways to get to you”
Are your passwords on this list?
They shouldn’t be but you never know: Top 200 Most Common Password List 2021 The infographic above will put you on the right track. My preference where possible is to go passwordless:
WordPress websites are easy hanging fruit for hackers – is yours?
I have just published the second part of a series of articles looking at the governance that business owners and boards should exercise over software, websites and their reputation:
Stress – the classic social engineering tactic
Threat actors have to find ways of breaking down our cyber security training – that is where social engineering comes in. They want to find some way to get you to do what they want – this usually means exploiting your trust, but a bt of stress in there to …
Continue reading “Stress – the classic social engineering tactic”