Zero-Day Exploit in Internet Shortcuts: What You Need to Know about CVE-2024-38112

The APT group known as Void Banshee has been conducting spear phishing campaigns at a near global level for several months. The group has been making use of a zero-day exploit found in the rendering engine for Internet Explorer, known as Trident. The final payload for the attack is the Atlantida Stealer malware. This malware […]

The Risks of Excessive Admin Privileges

The Risks of Excessive Admin Privileges In any business, especially SMEs, admin privileges are crucial for managing IT systems. However, when too many people have these privileges or they’re not managed well, it can spell trouble. Let’s examine the potential consequences of excessive admin privileges and ways to mitigate the impact of compromised admin accounts. […]

Older Applications and the MFA Gap

Older Applications and the MFA Gap Older applications, built with outdated technology frameworks, are relics of a past time when cybersecurity factors were very different from today or even not present at all.  These applications from the past were forged in an age when security was but an afterthought, their foundations laid without the foresight […]

The Essential Eight: A Comprehensive Framework for Cybersecurity Excellence

The Essential Eight: A Comprehensive Framework for Cybersecurity Excellence In an era marked by ever increasing and more frequent cyber threats, the Essential Eight framework gives clarity and efficacy, offering organisations a carefully crafted set of strategies that prioritise simplicity, standardisation, ease of use, familiarity, and the crucial balance between protection and business continuity. The […]

WHAT is VOLT TYPHOON?

WHAT is VOLT TYPHOON? The more correct question is WHO is Volt Typhoon? Volt Typhoon is a state-supported Chinese cyber operation. As detailed in an advisory released 8 Feb 2024, the ACSC reported that Volt Typhoon has compromised thousands of internet-connected devices as part of a larger effort to infiltrate western critical infrastructure, including naval […]

Essential Eight Assessment Tools

Essential Eight Assessment Tools Using a tool for Essential Eight assessments has several advantages over manual human assessment, and not just because it’s cost effective. The Australian Cyber Security Centre outlines five good reasons to use a tool: Efficiency: Automated tools can perform assessments much faster than humans, saving valuable time. Accuracy: Tools can reduce […]