Welcome to this week’s edition of the Threat Source newsletter.
Last weekend, I witnessed a crime. Not a notable crime that you might read about in the press, but an unremarkable fraud attempt that nevertheless illustrates how new threat actor capabilities are emerging.
I imagine that most people reading this probably field IT questions from friends, family, and your local community. I assist with...
This article highlights the evolving threat landscape in cybersecurity, with attackers employing increasingly sophisticated techniques like "inbox dominance" to gain control over email accounts and launch further attacks. The emphasis on employee training and awareness suggests a recognition that human error is often a significant factor in security breaches.
The advice given – being cautious when clicking links or downloading attachments from unknown sources – aligns with common cybersecurity b...
