Just a quick bit of advertising here – our next Business Cyber Security Master Class starts on Monday, and we could still squeeze in one or two extra business owners or managers who want a better overview of business cyber security. Business cyber security – Masterclass – Octagon Technology Is …
Too good to be true – You’ve won! Is it time you and your team got some training to combat social engineering?
It is the oldest and easiest bit of email social engineering – promise you something that is too good to be true. Your tempted and the hackers have got you. You think this would have gone the way of “princes offering to share millions with you, if you will just …
Anatomy of a RAT attack using a password protected Excel attachment
This is the classic way a hacker gets their payload into your business – send you a spreadsheet that needs your immediate attention. Include the password in the email, this makes it more likely for you to open the file – make it look official and your cyber security threat …
Continue reading “Anatomy of a RAT attack using a password protected Excel attachment”
Do you know what “business email compromise” is? Better still do you know how to combat this cyber security attack?
Research from the FBI shows how costly this type of cyber attack is to businesses: FBI: Business Email Compromise attacks led to more than $43 billion in losses since 2016 – The Record by Recorded Future At Smart Thinking and Octagon, we have had to investigate and deal with several …
Flaw discovered in third-party code libraries used by hundreds of vendors
Among the vendors using uClibc and the uClibc variant uClibc-ng are Linksys, Netgear, Axis and Gentoo an embedded Linux distribution. This page from Ars Technica has links to the impacted devices: Gear from Netgear, Linksys, and 200 others has unpatched DNS poisoning flaw | Ars Technica Vendors were informed of …
Continue reading “Flaw discovered in third-party code libraries used by hundreds of vendors”