Credential stuffing is a cyber attack method in which attackers use lists of stolen account credentials (which typically consist of usernames/email addresses and the corresponding password) to gain unauthorised access to web application user accounts. The attackers use bots (software applications that are programmed to do specific tasks) to automate large-scale login requests using the…
In this blog post, we’ll delve into some of the biggest cyber attacks and data breaches of 2023, exploring the details of each incident and looking at potential prevention strategies.
QR codes are a quick and easy way for organisations to provide access to websites, payment options, and digital information with a mere scan. However, with this increased adoption, cybercriminals are finding innovative ways to exploit them, leading to a major increase in QR code phishing attacks.
SIM swapping attacks are on the rise, and Financial and Risk Advisory firm Kroll has been the latest high-profile victim. But what exactly does a SIM swapping attack entail, and how can you prevent falling victim? We take a look in this blog.
By understanding the different types of cyber threats and how to prevent them, you can implement the necessary cyber security defences and reduce the risk of an attack. In this blog, we take a look at the most common types of cyber attacks and provide practical advice on how you can mitigate these threats.
Understanding the rise of ransomware and its implications is crucial when it comes to protecting your organisation. In this blog post, we take a look at how ransomware works, why the rate of attacks is rising, and the measures you need to implement to keep your organisation protected.
A significant security concern has emerged in MOVEit Transfer, a widely used secure file transfer service. The vulnerability, named CVE-2023-34362, was uncovered on May 31, 2023.
A popular method that we’ve been seeing recently on how attackers hide their malware is by packing it into an encrypted zip folder. So how can you tell if a file inside a zip folder is safe or not?
Last month, multiple cyber security companies reported malicious activity of a trojanised version of the 3CX Desktop App that clients were using to make VoIP calls.
In this blog, we will explore the dangers of phishing scams in more detail, and provide tips on how to spot and avoid them.