My article on one of the methods used by threat actors to erode our faith in multi-factor authentication (MFA) was published over on CyberAwake yesterday: More on MFA and your risks when using it – CyberAwake
You should be on the lookout for this phishing campaign…
There is an active email phishing campaign infecting both home users and organisations. The malicious emails contain a .zip attachment. The payload is called IceXLoader and it primarily exfiltrates sensitive information from infected systems: Phishing drops IceXLoader malware on thousands of home, corporate devices (bleepingcomputer.com) The threat actors are not …
Continue reading “You should be on the lookout for this phishing campaign…”
You need excellent anti-virus software but…
It is obvious that every computer – including Macs – need the best anti-virus you can afford and you need to be able check that your team do not turn it off! However the threat actors know you have invested in great anti-virus software so they work to get around …
Continue reading “You need excellent anti-virus software but…”
Business Email Compromise
Everyone needs policies and procedures that address the potential risk of business email compromise (BEC). That is when the threat actors through impersonation or compromised credentials get inside an email system and send malicious business instructions to your team pretending to senior people in your organisation or trusted partners. Here …
Did you know that multi-factor authentication can be defeated by threat actors?
Multi-factor authentication (MFA) is not perfect and it can be compromised by threat actors. However, we still stand by our advice to all our clients: Always use MFA – using and authenticator app – whenever it is available. I published an article yesterday on CyberAwake about some of the issues …
Continue reading “Did you know that multi-factor authentication can be defeated by threat actors?”