Data Protection Seven types of malware your firm should be aware of Deployed via phishing emails, social engineering strategies and network penetration, malware can be hard to…Brad10th March 2021
Data Protection International airline discloses extensive data breach Malaysia Airlines Berhad, currently branded as Malaysia Airlines, has revealed that it has been hit…Mark8th March 2021
Ransomware Getting to grips with Ryuk ransomware The name of a well-known ransomware family, Ryuk was initially identified back in 2018 and…Lydia6th March 2021
Data Protection German telecoms giant discloses data leak German-headquartered telecoms provider T-Mobile has now disclosed it has experienced a data breach in the…Brad4th March 2021
Ransomware Ransomware gang hits Finnish IT services firm One of Finland’s leading IT services and software development firms has been attacked by ransomware…Mark2nd March 2021
Phishing Top tactics used in phishing attacks today The pandemic has seen malicious actors ramp up their phishing campaigns in multi-pronged attacks. Hitting…Mark1st March 2021
Encryption News What are “Common Vulnerabilities and Exposures” (CVEs)? When upgrades are issued for software and hardware used by your firm, you may find…Lydia28th February 2021
Data Protection What are credential stuffing attacks and how can they be conquered? A type of attack method used by cybercriminals, credential stuffing involves malicious operators employing lists…Brad26th February 2021
Cyberattack What is a “botnet”? A botnet is the name given to a collection of enslaved internet-connected computers and other…Lydia25th February 2021
Cyberattack UK cryptocurrency exchange knocked offline A recent distributed denial-of-service (DDoS) attack temporarily took down the servers of EXMO, the well-known…Mark24th February 2021