White Dross

[vc_row][vc_column][vc_column_text css=”.vc_custom_1553424145962{margin-bottom: 0px !important;}”]You would be forgiven for thinking that we might be talking about the Australian extremist who murdered 50 men, women and children in cold blood this week. But we won’t be affording him any further mention. White Dross is the primary by-product of aluminium production and recycling (who knew?). This week there […]
LOCKERGOGA

Priority: High Executive Summary: Norsk Hydro, a Norwegian metals and renewable energies company, has been hit with a severe ransomware infection across their network. Information from NorCERT strongly indicates that the ransomware is LockerGoga, however this is yet to be confirmed by Norsk Hydro. This information also specifies that the attack is spread by targeting Active […]
Crash, Bang, Wallop

As computer systems become increasingly integral, unavoidable and essential components of our everyday lives, the potential impact of failure does not sit easily with the drivers for development such as profit, performance and feature enhancement. Regular readers of this blog or attendees of our Cyber Summit, which now seems a lifetime away, may recall our […]
NSA Releases Security Research Tool But Can You Trust It?

Article by Davey Winder – Forbes 7 March 2019 In recent years it has become almost commonplace for leaked National Security Agency (NSA) hacking tools to hit the headlines thanks to being used in attacks such as WannaCry, NotPetya and even the Democratic National Committee (DNC) email breach during Hilary Clinton’s U.S. election campaign. But now the NSA has released an […]
Tooled Up

This week has been the week of the annual RSA security conference held this year at the Moscone Centre in lovely San Francisco. As with all vendor-sponsored events, quite a lot of the event is all about tools. Old tools, new tools, tools that are but a twinkle in the eye of the creator being […]
The Case For EDR: Can it be right that in 2018 antivirus products missed on average 76% of cyber-attacks?

[vc_row][vc_column][vc_column_text css=”.vc_custom_1553005845054{margin-bottom: 0px !important;}”] In this article Sudarshan Krishnan, ITC Senior Cyber Analyst, details what EDR is, what it isn’t and how you can apply it to your business. For many years, antivirus software primarily focused on protecting end-user devices (laptops, mobile devices, etc.) against “known” security threats, has been the foundation of endpoint security. […]
ITC Secure expert on how to minimise phishing attacks

Article by Jess Phillips – Intelligent CISO 28 February, 2019 Jack Cooper, Senior Cyber Advisor, ITC Secure, discusses what procedures companies should have in place to minimise phishing attacks. It is no coincidence that Ciaran Martin, CEO of the NCSC, described phishing attacks as being the number one priority for boardrooms this year. Phishing remains a […]
No Shizzle Sherlock

[vc_row][vc_column][vc_column_text]Regular readers may be very well aware that we have been calling out Crypto Currency as the Wild West for some time. We have seen many alleged heists of Crypto Exchanges (as in; you exchange your money for nothing), like Mt Gox, and Zaif, all of which are very suspicious. In February we discussed the […]
Mad as a Black Hatter

The expression ‘mad as a hatter’ is apparently an old English colloquial saying, which predates Lewis Carroll’s brilliant character. Amongst many theories for the origins is the fact that hardworking milliners in times of yore were often poisoned by mercury used in the process. Lovely. We all know that it doesn’t take mercury to drive […]
Five recommendations from the NCSC

At the CBI conference in September 2018 the CEO of GCHQ’s National Cyber Security Centre (NCSC), Ciaran Martin, delivered The Board Guidance Tool Kit. Here is a summary of his five recommendations, together with some suggested security approaches and/or remediation tactics. “Control the use of your privileged IT accounts” Ciaran Martin – CEO at NCSC […]