Ransomware Risk Management Fundamentals

Looking across the Internet for new stories and new events in this holiday season I look at the fundamentals, thus found the NIST Cybersecurity framework profile:Ransomware Risk Management Specifically the NIST.IR.8374 document From this document I have  grabbed 3 basic items which everyone should be aware of in the image as well as in text … Read more

Calendar Invite Phish Attack Also

I bumped intothis site  (Dresec)   latest post is “Phishing with Google calendar”   His first sentence is a disclaimer as he does not want other people to use the information to send phishing calendar invites. To him (and me) it is only designed to be a test within our organizations. Here is the sample … Read more

Attack versus Defense – What is Status?

It is September 5th, 2022  and probably as good a time as any to re-evaluate where we are with a general Attack versus Defense analysis: Attackers:  Only need to find one problem in defense to overcome and take advantage of to breach a system or network. Once the system is found that can be overtaken … Read more

Vishing Attacks on The Rise

What is Vishing? Voice phishing, also known as vishing, is the practice of eliciting information or attempting to influence action via the telephone.(from hhs.gov site) Recently, a large U.S. company fell victim to a cyber attack that leveraged sophisticated phishing techniques involving phone calls to gain access to the victim organization. Phishing campaigns continue to … Read more

Is Ransomware Like Lightning? Does it hit same site 2x?

lightning like ransomware?

The Myth of Lightning not striking the same place  again and again should be broken by now as in tomorrow.io post: What about ransomware, does it hit in the same place twice? Unfortunately just like lightning can hit the same place twice especially if it is a Metal rod on top of a tall building, … Read more