What are botnets?

What are botnets

Continuous monitoring by cybersecurity firms like RiskXchange highlights vulnerabilities that hackers could exploit to prevent a botnet attack.     What are botnets? In short, a botnet is a group of internet-connected devices (IoT) that are infected by malware and used for cyberattacks by cybercriminals. They tend to be under the control of one attacking party, the “bot-herder.” Each machine under the … Read More

How malware has evolved over time 

How malware has evolved over time 

One of the key reasons that organisations of all sizes can’t take their cybersecurity for granted is that nothing stays still for long. The methods that cybercriminals use to breach organisations’ defences and steal or compromise their sensitive data constantly evolve and grow increasingly sophisticated – and this is especially true of malware. To understand how to protect yourself from cyber … Read More

How to avoid a baiting attack

How to avoid a baiting attack

Social engineering attacks are one of the most significant threats to an organisation’s information security. So much so that a staggering 98% of cyberattacks involve some social engineering component. One of the social attacks favoured by cybercriminals is known as baiting.   In this article, we look at baiting attacks and how to avoid them.  What is a Baiting Attack?  Baiting … Read More

How to prevent a pharming attack & what it involves

How to prevent a pharming attack

A recent study has revealed that 88% of organisations worldwide have suffered a DNS attack in the past year. More alarmingly, each organisation experienced seven attacks on average – at $942,000 (£836,000) per attack. One of the most common forms of attack on DNS servers is known as pharming.   Let’s explore what a pharming attack is, how they occur, … Read More

What is killware and how it can threaten your organisation

What is killware and how it can threaten your organisation

Cyberattacks are appearing in a new guise, in the form of killware. Killware is a code or program that deploys on machines with the sole intention of causing harm to people. As the name suggests, its aim is to kill. This deadly malware is, unfortunately, a growing threat right around the world.  Killware attacks might sound strange to some, but they’ve … Read More

Understand cloud computing vulnerabilities endangering your data 

understand cloud computing vulnerabilities

Cloud computing vulnerabilities basics When discussing cloud vulnerabilities, it’s important to define indicators based on clear and concise definitions of risk factors concerning cloud computing. Cloud computing security has never been as crucial as it is now. Not only are the risks and threats vast, but in many cases, the security itself is cited as the main stumbling block for … Read More

Who is targeted by ransomware? 

Who is targeted by ransomware

Ransomware is now commonplace within many industries around the world. Over the past three years, especially during the pandemic, ransomware attacks have increased in many different sectors including government, healthcare, education, professional services, and manufacturing.  According to the FBI’s Internet Crime Report 2021, America experienced an unprecedented increase in cyber-attacks and malicious cyber activity during 2021. These cyber-attacks compromised businesses … Read More

New Spring4Shell vulnerability: CVE-2022-22963 and CVE-2022-22965

New Spring4Shell vulnerability CVE-2022-22963 and CVE-2022-22965

Spring4Shell – a new zero-day vulnerability which affects Spring users It’s the second critical bug that has been identified on the application within a week. Spring is a widely used application framework and inversion of control container for the Java platform. Its core features can be used by any Java application which means a large number of users may have … Read More

Okta cyber security attack: Supply chain attacks on the rise

Okta cyber attack: cloud security Supply chain attacks

Analysing Okta cyber attack and what you should do if your business has been affected Organisations that use Okta to provide access to their networks have been affected by a cyberattack conducted by the hacking group Lapsus$. Okta said that in a worst-case scenario, 366 of its clients had been compromised and their “data may have been viewed or acted … Read More