Category: Cyber Attacks

  • What Is a Credential Stuffing Attack and How Does It Work?

    What Is a Credential Stuffing Attack and How Does It Work?

    Credential stuffing is a cyber attack method in which attackers use lists of stolen account credentials (which typically consist of usernames/email addresses and the corresponding password) to gain unauthorised access to web application user accounts. The attackers use bots (software applications that are programmed to do specific tasks) to automate large-scale login requests using the…

  • Identifying IoT Security Risks in Your Business

    Identifying IoT Security Risks in Your Business

    The Internet of Things (IoT) is transforming how businesses work by connecting everyday objects to the internet, enabling them to send and receive data. This technology boosts efficiency and allows for advanced data analysis. In this blog post, we take a look at the common security risks facing IoT devices, and preventative measures you can…

  • The Top Cyber Attacks and Data Breaches of 2023

    The Top Cyber Attacks and Data Breaches of 2023

    In this blog post, we’ll delve into some of the biggest cyber attacks and data breaches of 2023, exploring the details of each incident and looking at potential prevention strategies.

  • New QR Code Phishing Attacks and How to Defend Against Them

    New QR Code Phishing Attacks and How to Defend Against Them

    QR codes are a quick and easy way for organisations to provide access to websites, payment options, and digital information with a mere scan. However, with this increased adoption, cybercriminals are finding innovative ways to exploit them, leading to a major increase in QR code phishing attacks.

  • SIM Swapping Attacks and How to Prevent Them

    SIM Swapping Attacks and How to Prevent Them

    SIM swapping attacks are on the rise, and Financial and Risk Advisory firm Kroll has been the latest high-profile victim. But what exactly does a SIM swapping attack entail, and how can you prevent falling victim? We take a look in this blog.

  • Common Types of Cyber Attacks and How to Prevent Them

    Common Types of Cyber Attacks and How to Prevent Them

    By understanding the different types of cyber threats and how to prevent them, you can implement the necessary cyber security defences and reduce the risk of an attack. In this blog, we take a look at the most common types of cyber attacks and provide practical advice on how you can mitigate these threats.

  • The Rise of Ransomware: What You Need to Know

    The Rise of Ransomware: What You Need to Know

    Understanding the rise of ransomware and its implications is crucial when it comes to protecting your organisation. In this blog post, we take a look at how ransomware works, why the rate of attacks is rising, and the measures you need to implement to keep your organisation protected.

  • MOVEit Hack – Key Points, Detection and Remediation

    MOVEit Hack – Key Points, Detection and Remediation

    A significant security concern has emerged in MOVEit Transfer, a widely used secure file transfer service. The vulnerability, named CVE-2023-34362, was uncovered on May 31, 2023.

  • Malware – Evading Detection Through Zip Folders

    Malware – Evading Detection Through Zip Folders

    A popular method that we’ve been seeing recently on how attackers hide their malware is by packing it into an encrypted zip folder. So how can you tell if a file inside a zip folder is safe or not?

  • 3CX Breach Caused by Double Supply Chain Attack

    3CX Breach Caused by Double Supply Chain Attack

    Last month, multiple cyber security companies reported malicious activity of a trojanised version of the 3CX Desktop App that clients were using to make VoIP calls.