Industrial systems, large and small run on computers – so why not attack them? So here is the scenario – which Octagon has had to deal with in the past – someone leaves and forgets to leave the password for a system that is accessed only occasionally. You cannot contact …
OpenDocument files distributing stealth malware – make sure your team can recognise these types of attack.
This report is from HP’s Threat Research Blog and is about a threat discovered impacting hotels in South America. But it illustrates the wide range of threats that can get to you via an email attachment and has some examples you can look at. Stealthy OpenDocument Malware Deployed Against Latin …
A few of the ransomware stories in the media at the moment – to give you some idea of the scale of the cyber security risk you have to plan for. Do you need training?
I have gathered here just a selection of the ransomware stories that have made the headlines – for these there are many more that go unreported in the media or even outside the organisation. ‘Lives are at stake’: hacking of US hospitals highlights deadly risk of ransomware | Hacking | …
More and more phishing attacks – each with their own special touch to exploit the trust of your people!
A UK Government’s report looking at cybersecurity breaches across the country, (UK Government. 2022), prepared by Department for Digital, Culture, Media & Sport (and sport!) showed clearly email phishing is a real threat: “Of the 39% of UK businesses who identified an attack, the most common threat vector was phishing …
Very, very occasionally a ransomware attack has a happy ending! However do you need training in cyber security planning?
In December 2019, Maastricht University in the Netherlands, decided to pay the ransom, of €200,000 at the time, to release the data of over 22,00 students, the academics and the university administration. Maastricht University wound up earning money from its ransom payment (bleepingcomputer.com) Since then the Netherlands Public Prosecution Service …