Cybercriminal campaign targets VoIP systems
Dedicated threat analysts recently discovered a large-scale malicious campaign designed to target Elastix Voice over Internet Protocol (VoIP) telephony servers. In just a three-month period,…
Dedicated threat analysts recently discovered a large-scale malicious campaign designed to target Elastix Voice over Internet Protocol (VoIP) telephony servers. In just a three-month period,…
One aspect that enterprises must consider when of protecting themselves from potential cyber threats is to acknowledge the danger of digital footprints. Sometimes referred to…
Entrust, the digital security giant, recently confirmed that it had been struck by a targeted cyberattack. The hit involved threat operators breaching the security firm’s…
To take advantage of specialist knowledge and skills available possessed by different individuals and organisations, collaboration is an essential process for every successful company.
Phishing emails can have devastating consequences for companies when they fool recipients. These scam messages can include malicious links and attachments and, if users interact…
To remain competitive and operate at their optimum, businesses must be agile while staying secure.
Experts have uncovered a threat operator infecting dedicated industrial control systems (ICS) to build a botnet using password crunching software designed for programmable logic controllers…
Ransomware has become an increasingly popular form of attack for threat operators in recent years. So much so that many cybercriminal gangs have switched out…
Multifactor authentication (MFA) is a recommended method for safeguarding secure information protected by passwords. MFA adds an extra layer of protection that can mitigate date…
The already high number of organisations paying out following ransomware attacks is increasing. This continuing spike has prompted the UK’s Information Commissioner’s Office (ICO) and…