t2

DNS records – abandon at your peril

DNS records – abandon at your peril

Recently, there has been some interesting news describing how attackers have been able to take over various subdomains by taking advantage of abandoned DNS records. To recap, this is a security mis-configuration issue: A victim organisation sets up (perhaps in a testing scenario) a service on a public cloud provider such as Azure. The organisation […]

Scareware v1 – Just silly… probably

Scareware v1 – Just silly… probably

Along with lots of other people on the Internet, you’ve probably received an unsolicited email, not only threatening you but claiming to have stolen your password and hacked your web cam.  The emails generally go along the following lines: While poorly worded, the email can certainly appear alarming and indications are that perhaps the attacker […]