Blog / malware
We recently assisted a client that was aggressively hit with a phishing campaign. Following a couple of successful compromises they found themselves faced with an escalation with the malware attempting to impersonate staff, both emailing their customers and pivoting to attack the admin users in a secondary phishing attack. What made things a little more interesting than the usual kiddy attack was that the initial malware was not carrying a particularly nefarious payload, which meant that it escaped the usual malware detection that the client had deployed.
Topicsatlassian ciso cloud covid19 crime culture cybersecurity insider-threat malware remote-working security
Today we have another guest post, this time by Rhea Murray writing exclusively for Attomus: Let me start by stating the obvious - it pays to offer con...
Let us start by stating an age-old maxim : You cannot eliminate all risks. But you can reduce the level of risks to an acceptable standard. That’s why...