3B Data Security Blog

  • MOVEit Hack – Key Points, Detection and Remediation

    MOVEit Hack – Key Points, Detection and Remediation

    A significant security concern has emerged in MOVEit Transfer, a widely used secure file transfer service. The vulnerability, named CVE-2023-34362, was uncovered on May 31, 2023.

  • Cyber Incident Tabletop Exercises – Everything Explained

    Cyber Incident Tabletop Exercises – Everything Explained

    If your organisation falls victim to a cyber incident, you need to have response measures in place to contain and minimise the impact. But how do you know if your incident response plans are effective?  That’s where Cyber Incident Tabletop Exercises come in.

  • How to Respond and Recover From a Payment Card Breach

    How to Respond and Recover From a Payment Card Breach

    If your organisation falls victim to a payment card breach, it’s vital you respond quickly and effectively to contain the breach and reduce its impact. In this blog post, we take you through a step-by-step guide on how to do just that. 

  • Data Breach: How to Discover the Extent of the Damage

    Data Breach: How to Discover the Extent of the Damage

    If you suffer from a data breach, it’s important to act quickly to contain the breach and determine the cause and extent of the damage. In this blog, we’ll guide you through the steps you need to take when it comes to investigating a data breach, and how to discover the extent of the damage.

  • Google’s .zip and .mov TLDs Enabling New Phishing Tactics

    Google’s .zip and .mov TLDs Enabling New Phishing Tactics

    In a recent announcement, Google unveiled a range of new top-level domains (TLDs), including some unexpected choices like “.zip” and “.mov.” While these additions expand the possibilities for website addresses, they also raise concerns about potential phishing and online scams

  • What is Vulnerability Scanning and How Does it Work?

    What is Vulnerability Scanning and How Does it Work?

    Vulnerability scanning is a crucial element of any robust cyber security strategy. To mitigate the risk of cyber threats, you need to be aware of weaknesses and vulnerabilities that are present in your systems and patch them before they can be exploited. So, what is vulnerability scanning and how does it work?

  • Malware – Evading Detection Through Zip Folders

    Malware – Evading Detection Through Zip Folders

    A popular method that we’ve been seeing recently on how attackers hide their malware is by packing it into an encrypted zip folder. So how can you tell if a file inside a zip folder is safe or not?

  • An Introduction to The Cyber Advisor Scheme

    An Introduction to The Cyber Advisor Scheme

    The National Cyber Security Centre (NCSC), in partnership with IASME, have recently launched a new Industry Assurance Scheme – Cyber Advisor. This scheme aims to help small and medium-sized businesses ensure they have baseline cyber security controls in place.

  • 3CX Breach Caused by Double Supply Chain Attack

    3CX Breach Caused by Double Supply Chain Attack

    Last month, multiple cyber security companies reported malicious activity of a trojanised version of the 3CX Desktop App that clients were using to make VoIP calls.

  • VA+ Training for Cyber Essentials Assessors

    VA+ Training for Cyber Essentials Assessors

    This course specifically prepares individuals for the Vulnerability Assessment Plus (VA+) examination, a certification developed in collaboration with the National Cyber Security Centre, IASME, and CyberScheme.