For a successful ransomware attack the threat actors have to get their malware onto a user’s computer inside the secure network. Posing as your IT support is one way to get in: Ransomware gangs pose as IT support in Microsoft Teams phishing attacks – BleepingComputer Social Engineering In this attack …
Get Organised – Cyber Security
It is a new year, so it is a good time for a new start. Over on Octagon’s blog this month the theme for the month is going to be “get organised” and I am going to start the 2025 Wednesday Bits on the same theme. Cyber Security and Get …
Back to Basics – The Collection IV
As 2024 draws to a close and we all start making plans for the holiday season, I thought it would be a good idea to publish an updated list of all my Back to Basics cyber security primers as this week’s Wednesday Bit. These are easy read short series designed …
Why you need to protect your organisation’s M365 credentials
We have had to deal with several incidents of Business Email Compromise (BEC), where for one reason or another someone has had their Microsoft credentials compromised and a threat actor has got inside their email. It is a serious problem because threat actors make a lot of money from it. …
Continue reading “Why you need to protect your organisation’s M365 credentials”
Phishing network disrupted
Phishing attacks are repeatedly shown to be the number one cyber security risk for organisations in the UK – see the report linked below. So, anything that disrupts the threat actor’s ability to carry out and exploit these types of cyber-attacks is good news for everyone. Microsoft and the US …