The European Union (EU) has issued a warning about the measurably increase in the volume of Russian cyber-attacks associated with the Russia Ukraine conflict and how these attacks can easily spread to other regions. Nations that actively support Ukraine, with whatever resources, are likely to be “at risk” of this …
Industrial systems as targets for threat actors – this why you need a software policy. Do you have one?
Industrial systems, large and small run on computers – so why not attack them? So here is the scenario – which Octagon has had to deal with in the past – someone leaves and forgets to leave the password for a system that is accessed only occasionally. You cannot contact …
OpenDocument files distributing stealth malware – make sure your team can recognise these types of attack.
This report is from HP’s Threat Research Blog and is about a threat discovered impacting hotels in South America. But it illustrates the wide range of threats that can get to you via an email attachment and has some examples you can look at. Stealthy OpenDocument Malware Deployed Against Latin …
A few of the ransomware stories in the media at the moment – to give you some idea of the scale of the cyber security risk you have to plan for. Do you need training?
I have gathered here just a selection of the ransomware stories that have made the headlines – for these there are many more that go unreported in the media or even outside the organisation. ‘Lives are at stake’: hacking of US hospitals highlights deadly risk of ransomware | Hacking | …
More and more phishing attacks – each with their own special touch to exploit the trust of your people!
A UK Government’s report looking at cybersecurity breaches across the country, (UK Government. 2022), prepared by Department for Digital, Culture, Media & Sport (and sport!) showed clearly email phishing is a real threat: “Of the 39% of UK businesses who identified an attack, the most common threat vector was phishing …
