Post date: 13/12/2021 - 14:12

A critical remote code execution vulnerability (CVE-2021-44228) believed to affect millions of systems world-wide has been disclosed dubbed Log4Shell affecting multiple version of a Java logging package Log4j.

The threat is so serious because if an attackers managed to exploit the vulnerability, they gain the ability to execute code which could lead to total system control. This would then allow the attack to install ransomware, deploy coin miners, steal data, the list is endless.

Post date: 13/12/2021 - 11:57

An 88-page report conducted by the National Cyber Security Centre (NCSC), a subdivision of GCHQ, detailed a record-breaking 777 cyberattacks handled by the organisation – 20% of which were targeted towards COVID-19 research centres and other healthcare entities. This is an increase on the already high 723 cyber events handled by the NCSC last year, which included a rise in ransomware attacks where a cybercriminal or hostile state encrypts an organisations data and demands a ransom for its safe return. However, the data is very rarely returned even upon receipt of the payment.

Post date: 13/12/2021 - 10:52

Society, both business and personal, has become hinged on technology. In recent years the dependence has become ever more present as the technology we have come to rely on grows and adapts further to our needs, bringing us lifesaving, time-saving, and boredom-saving solutions for every problem.

Post date: 08/12/2021 - 11:56
Post date: 27/10/2021 - 10:37

NETSCOUT’s Arbor has the broadest portfolio of DDoS attack mitigation in the entire cybersecurity industry, seeing organisations of any size and sector continuously protected from the current rise in cybercrime.

Post date: 25/10/2021 - 12:09
Employee Burnout

Most mornings start with the best intentions in mind. Throughout the day, there are tasks to finish, calls to make, cleaning to do and people to care for, to name just a few. Normally, by the afternoon reality has set in, to-do lists are put down and what we couldn’t fit in today will be moved to tomorrow or next week. It Is impossible to do everything in one day, and most of the time, our best should be good enough.

To avoid being burned out, most people will function in a sort of power-saving mode. This helps to avoid a complete shutdown.

Post date: 18/10/2021 - 14:23

According to a report conducted by cybersecurity specialists Arctic Wolf, a third of enterprises surveyed were the victim of a cybersecurity attack costing them at least £100,000 to resolve, with a further 50% of them admitting to having concealed a breach, perhaps in an attempt to avoid further attacks or public scrutiny.

Post date: 18/10/2021 - 09:22

A report conducted by the cyber research firm, CyberEdge, has revealed that 92.3% of education-based organisations questioned were victims of at least one successful attack in the past 12 months, shortly followed by 90.3% of manufacturing-based companies.

Post date: 18/10/2021 - 09:11

It’s easy to assume that a cyberattack targeting the vital parts of a nation’s infrastructure could potentially lead to detrimental and life-threatening occurrences, however, up until now no data was collected that directly linked the two instances. This changed during the COVID-19 pandemic when a natural experiment took place at the University of Vermont Health Network (UVM) which allowed the Cybersecurity & Infrastructure Security Agency (CISA) to finally gain powerful insights into the true impact of ransomware and cybercrime on the health sector.

Post date: 15/10/2021 - 10:00

Phishing as a service (PhaaS) is a common term often used in cybersecurity to describe the preventative act of sending phishing emails to a company’s employees to test their general cyber-awareness.

Pages