Blog / malware
We recently assisted a client that was aggressively hit with a phishing campaign. Following a couple of successful compromises they found themselves faced with an escalation with the malware attempting to impersonate staff, both emailing their customers and pivoting to attack the admin users in a secondary phishing attack. What made things a little more interesting than the usual kiddy attack was that the initial malware was not carrying a particularly nefarious payload, which meant that it escaped the usual malware detection that the client had deployed.
Topicsatlassian ciso cloud covid19 crime culture cybersecurity employees insider-threat malware office365 remote-working security semafore
Let me start by stating the obvious - it pays to offer continuous and comprehensive employee training. A Life with Health CEO Aimee Tariq explains why...
Let us start by stating an age-old maxim : You cannot eliminate all risks. But you can reduce the level of risks to an acceptable standard. That’s why...