The Armoury – February 2025
Mani Padisetti
Co-Founder and CEO at Emerging Tech Armoury, AI Consulting + Training Services | A.I. Strategist | Educator | Green Tech + Cyber Specialist | Forbes Technology Council Member
Welcome to The Armoury?
Cyber threats are getting sophisticated, and the number and style of threats are on the rise. We understand that your schedule is packed, but staying informed about cybersecurity is a top priority. With The Armoury, we've curated the most relevant and important content from trusted sources. Our team handpicks articles, news items, and tips that you need to know, saving you time and effort while ensuring you have the knowledge to protect yourself and your organisation.?
If you ever decide that The Armoury no longer aligns with your needs, you can easily unsubscribe at any time.?
Stay safe.?
Latest Cybersecurity News?
Cybersecurity Tips & Best Practices?
Cybersecurity Awareness & Education?
Did you know??
The term ‘Firewall’ comes from real fires. In network security, a firewall is a system that filters traffic to prevent unauthorised access. The term comes from physical firewalls, which are barriers used in buildings to stop the spread of fires. Just like a network firewall acts as a barrier to stop the spread of malicious traffic on a computer network.???
Cybersecurity FAQ?
Cybersecurity FAQ?
Virus, Worm, and Trojan: What’s the Difference??
Cyber threats come in many forms, but viruses, worms, and trojans are among the most common types of malware. While they may seem similar, they behave differently in how they spread and cause damage.?
?
1. Virus: A virus is a type of malware that attaches itself to files or programs and requires human action to spread. When an infected file is opened, the virus executes and can corrupt files, slow down systems, or even delete data.?
Example: The ILOVEYOU virus (2000), which spread through email attachments and caused widespread damage.?
?
2. Worm: A worm is a self-replicating malware that spreads across networks without needing a host file or user action. It can exploit system vulnerabilities, overload networks, and install additional malware.?
Example: The WannaCry worm (2017), which spread ransomware to thousands of computers worldwide.?
3. Trojan: A trojan disguises itself as legitimate software but contains hidden malware. It does not self-replicate but can be used to steal data, spy on users, or give hackers remote access to a system.?
Example: The Zeus Trojan, which targeted banking credentials and financial information.?
?
Cybersecurity Event?
?
Australian Cyber Conference?
Date: 17-19 March, 2025?
Location: National Convention Centre, Canberra?
?
Cybersecurity & Breach Response Bootcamp?
Date: 27 March, 2025?
Location: Sydney CBD?
Cybersecurity Trivia of the Month?
In 2008, a malware called Agent.BTZ infiltrated U.S. military networks through an infected USB drive plugged into a laptop in the Middle East. The malware spread undetected, creating a backdoor that could allow cyber espionage.?
This attack led to the U.S. Department of Defense banning USB drives and launching Operation Buckshot Yankee, a major cybersecurity initiative to strengthen military defences.?
Recent Ransomware Attack?
Akira Ransomware Gang Claims Attack on Defunct Australian Media Firm?
The Akira ransomware gang claims to have stolen 16GB of sensitive data from the now-defunct Australian media company Regency Media, including NDAs, financial records, and personal details of employees and customers. However, verifying these claims is difficult as the company dissolved in 2023.?
Experts warn that cyber attacks on closed businesses highlight a major security risk, as legacy data often remains unprotected on abandoned servers. Rapid7’s Christiaan Beek emphasises the need for businesses to securely wipe or encrypt data before shutting down to prevent exploitation.?
This incident follows a November 2024 attack on Brisbane law firm Nicholsons Solicitors by the INC Ransom group, which allegedly exfiltrated 250GB of sensitive documents. These cases underscore the need for stronger post-closure data security frameworks to prevent cybercriminals from targeting unmanaged data.?
Source: Cyberdaily AU?
?
Cybersecurity Meme of the Month?
?
Sign up for The Armoury?
Sign up for our The Armoury to get the latest updates on Cybersecurity first-hand via email.?
#itbusiness #technology #cybersecurity #cybersecuritytips #cybersecurityupdates #innovation?
I LOVE LinkedIn & Microsoft ?? LinkedIn Certified Consultant ?????? Meetup & Business Networking Leader ?? Speaker ?? Master Influencer & Sales Coach & Mentor ???? Teachable Creator ?? Veteran ?? Christian ??Lassie Zia
3 天前Mani Padisetti love what you create and nice Maria Padisetti
--
3 天前That's veary informative and great service is good for the people around the world thanks for sharing this best wishes to each and everyone their ?????????????????????????