In our increasingly digital world, cyber threats pose a constant challenge to individuals and organizations alike. We're here to help you navigate this landscape by providing regular updates on the latest developments in cyber security. Our goal is to empower you with the knowledge you need to protect your digital life.
On this front page, you'll find insights into recent cyber threats and vulnerabilities that could impact your online security. We're dedicated to translating complex cyber security issues into practical, user-friendly information that you can put into action. Whether you're a concerned individual or part of a business seeking to bolster your defences, our updates are tailored to keep you informed.
Our team is committed to supporting you on your journey to a safer digital experience. We offer practical tips, best practices, and resources designed to help you safeguard your online presence. Trust us as your source for timely and relevant cyber security information. Stay informed, stay secure, and stay connected with us as we work together to protect your digital world..
In early 2024, a large corpus of data from DemandScience (a company owned by Pure Incubation), appeared for sale on a popular hacking forum. Later attributed to a leak from a decommissioned legacy system, the breach contained extensive data that was largely business contact information aggregated from public sources. Specifically, the data included 122M unique corporate email addresses, physical addresses, phone numbers, employers and job titles. It also included names and for many individuals, a link to their LinkedIn profile.
This Photo by Unknown Author is licensed under CC BY-ND
For more information please take a look a Troy Hunt's page on this breach https://www.troyhunt.com/inside-the-demandscience-by-pure-incubation-data-breach/
We are writing to share some important information that has recently come to our attention. It has been reported that MI5, the UK's domestic security service, has issued a warning that foreign states may be targeting British universities with the potential to impact national security.
We urge you to be vigilant against a rising security risk: QR Code Phishing, particularly those claiming to set up Microsoft Authenticator.
What Is It?
QR Code Phishing involves QR codes in emails that lead to fraudulent, malicious websites.
Scanning such a code, then entering your details can compromise sensitive data and accounts.
Simulating Microsoft Authenticator
Attackers are now generating QR codes pretending to be Microsoft Authenticator, or other systems. These lead to phishing sites aimed at capturing your credentials. This is an example we have seen over the last few days – Note the originating address, it isn’t Teesside, or Microsoft. These sites are often configured to mimic Microsoft, or Teesside University sites.
How to Stay Safe
1. Be Wary of Unsolicited QR Codes: QR codes are rarely, if ever distributed in email from legitimate companies
2. Report Issues: Flag any suspicious QR codes or URLs to our IT Helpdesk promptly.
We would like to bring your attention to an emerging cybersecurity threat that has recently come to light. We have identified a series of cyberattacks originating from compromised Microsoft Office 365 accounts in external organisations. These attacks are specifically targeting the higher education sector, including our university community, via Microsoft Teams, with the intention of distributing malicious PDF files. These files contain malware that can jeopardise your device, data, and accounts.
Attack Overview:
The attackers exploit compromised external Microsoft Office 365 accounts and appear as external entities. They may invite you to Teams meetings or chats and ask you to download files. These seemingly harmless files can harbour malware, posing a substantial risk to your device and personal information. Here's an example of a typical attack — please take note of warning banners indicating external sources:
Protect Yourself:
To safeguard yourself and our university's digital environment, please follow these critical precautions:
Exercise Extreme Caution: Exercise the utmost caution when receiving unsolicited file download requests, particularly from external organisations.
Avoid Unfamiliar Invitations: Just as with email phishing, if you didn't expect a Teams meeting or chat, refrain from clicking on it or any provided links. Please notify our IT Help team immediately.
Report Suspicious Activity: Swiftly report any suspicious messages or unusual behaviour in Teams to our IT support team. Your timely reporting enables us to respond effectively.
Teesside University has robust IT security controls in place, but our users remain our first line of defence against threats like this.