There is no doubt that threat actors are becoming more organised, with skilled organisations, not only carrying out attacks, but suppling highly capable hacking tools to less skilled organisations – fo a cut of the illicit profits: New EvilProxy service lets all hackers use advanced phishing tactics (bleepingcomputer.com) This one …
Another hotel leaks guest’s personal information
This is not the first time I have reported on a data theft from a hotel group or tourist company – and as they make such great targets, it probably will not be the last… Holiday Inn hotels hit by cyber-attack – BBC News Obviously if you have stayed in …
Continue reading “Another hotel leaks guest’s personal information”
Why authentication, authorisation and accountability are cornerstones of your cyber security
I have written an article over on CyberAwake, (our online cyber security training site), looking at triple A. Why you should care about the TLA AAA! – CyberAwake
Windows 11 automation tools open to abuse
Automating tasks on a computer used to be hard, but today it is very easy with a range of drag and drop tools available. Obviously the Power Automate included into Microsoft’s Windows 11 will be among the most popular – I know I use it. Now researchers at Zenity have …
Continue reading “Windows 11 automation tools open to abuse”
Just when you thought I had forgotten about ransomware
It is not possible to forget ransomware, just this week our engineers have updated a client’s back-up to one that is ransomware compliant – meaning, among other things, that the threat actors cannot access and so encrypt or alter the back-up during their attacks. Up to this point the client …
Continue reading “Just when you thought I had forgotten about ransomware”