Select a category

PCI DSS – Security Testing

According to the PCI Standards the goals of penetration testing are: 1.To determine whether and how a malicious user can ...
Read More

Cyber criminals earned a total of around $600 billion in 2018

Cyber crime is more profitable than the global illegal drug trade. (Source: Cybersecurity Ventures) The profit from the illegal drug ...
Read More

Firewalls are obsolete

73% of black hat hackers said traditional firewall and antivirus security is irrelevant or obsolete. (Source: Thycotic.com) According to the ...
Read More

66% of businesses attacked may not recover

66% of businesses attacked by hackers weren’t confident they could recover. (Source: Fortune) Most businesses don’t really know if they’re ...
Read More

Barbara Corcoran is missing nearly $400,000 Wednesday morning after her office was victimized by email scammers

"Shark Tank" star ( an American business reality television series ) Barbara Corcoran is missing nearly 400,000 Wednesday morning after ...
Read More

A U.S. Natural Gas Operator Shuts Down for 2 Days After a Phishing Attack Infects it With Ransomware

A U.S. Natural Gas Operator Shuts Down for 2 Days After a Phishing Attack Infects it With Ransomware Dan Goodin ...
Read More

Ransomware Criminals Hack an Accounting Company and Cause a Data Breach for Their Customers

Last December, a ransomware infection of Albany, New York-based accounting firm BST & Co. CPAs LLC exposed the confidential data ...
Read More

Hackers Post Details on MGM Resorts Guests

Hackers have posted on an underground forum the personal information of 10.6 million MGM Resorts guests, ZDNet reports. The exposed ...
Read More

Systems at Redcar and Cleveland Council have been down for almost three weeks after the ransomware attack.

(February 14 & 17, 2020)Computer systems belonging to the Redcar and Cleveland Borough Council (UK) were infected with malware. The ...
Read More

Phishing Statistics

View one of the Best Security Awareness Training and Phishing Progams

Join us Wednesday, March 4 @ 19:00 (GMT), for a live demonstration of how Middlewave introduces a new-school approach to security awareness ...
Read More

KnowBe4 Named a Leader in The Forrester Wave™ for Security Awareness and Training Solutions

We are excited to announce that Forrester Research has named KnowBe4 as a Leader in The Forrester Wave™: Security Awareness and ...
Read More

Attack Anatomy – What Is Phishing?

Phishing is the process of attempting to acquire sensitive personal information such as account details e.g. usernames, passwords and credit ...
Read More

Attack Anatomy – Session Hijacking

In session hijacking, the phisher exploits the web session control mechanism to steal information from the user. In a simple ...
Read More

Attack Anatomy – Keyloggers

Keyloggers refer to malware installed on your computer and used to capture keystrokes from the keyboard. The information is sent ...
Read More

Attack Anatomy – Domain Spoofing

A good example and one we see regularly is CEO fraud where the victim receives an email from what looks ...
Read More

How to protect ‘smart’ security cameras and baby monitors from cyber attack.

I read this simple but very effective article this afternoon. https://www.ncsc.gov.uk/guidance/smart-security-cameras-using-them-safely-in-your-home ...
Read More

WordPress Plugin Flaws Are Exploitable

Vulnerabilities in several WordPress plugins have been exposed. Updates are available to address flaws in the following plugins - Duplicator, ...
Read More

GhostCat Vulnerability Affects Apache Tomcat Servers (Important to Act Now)

04th March 2020 - A vulnerability in the Tomcat AJP protocol can be exploited to read file contents and access ...
Read More