Threat Intelligence Service

The avalanche of cyber security: How to identify the real threats

In this day and age, the wave of cyber security threats is deafening. Every week, businesses are facing millions of new malware variants and hacks, as well as having to deal with the deluge of media hype and marketing hysteria over the latest and newest threats, as well as the headlines of the most recent business to be breached. It’s no surprise, then, that it’s hard to keep up.We are now, more than ever, reliant on our technology. But with that reliance comes the need to ensure it’s safe and secure usage. Here are the key cyber security trends to watch out for this year.

The avalanche of cyber security: How to identify the real threats Read More »

Phish of the Month – Coronavirus Scams

Coronavirus scams

At least 3.4 billion phishing emails are sent worldwide each day and unfortunately, this includes the utilisation of international tragedies. Cyber criminals are cashing in on the global coronavirus epidemic by sending misleading phishing emails to exploit unsuspecting readers. The coronavirus (COVID-19) outbreak, is now affecting 43 countries around the world and has over 81,280

Phish of the Month – Coronavirus Scams Read More »

What effect does Windows 7 have on the Cyber Essentials Certification?

Windows 7 cyber essentials

Windows 7 End of Life On 14th January 2020, Microsoft ended all support for the widely used Windows 7 operating system, despite this, a large number of the world’s computers, mostly in corporate environments, are still running the nine-year-old system. The End of Life (EOL) for Windows 7 means there will be no further software/security updates including

What effect does Windows 7 have on the Cyber Essentials Certification? Read More »

WordPress 5.1 Vulnerability

A critical vulnerability in all but the most-recent WordPress versions has been revealed by security firm RIPS Tech. The vulnerability allows an unauthenticated attacker to hijack a logged-in administrator’s account to run arbitrary code on the target site. RIPS Tech report that ‘the vulnerabilit[y] exist[s] in WordPress versions prior to 5.1.1 and is exploitable with

WordPress 5.1 Vulnerability Read More »

6TB Citrix Data Breach

Cloud computing and software company Citrix have recently been the victim of a major cyber attack, with attackers gaining access to what cyber security firm Resecurity claims is ‘at least 6 terabytes of sensitive data stored in the Citrix enterprise network, including e-mail correspondence, files in network shares and other services used for project management and procurement.’

6TB Citrix Data Breach Read More »

Internet Explorer Zero-Day

Microsoft has just released an emergency security update to fix a zero-day vulnerability in Internet Explorer. A zero-day vulnerability means that this is the first time it has come to public attention, but there is always a possibility that cybercriminals may have independently discovered the vulnerability previously, and that they could have used it in

Internet Explorer Zero-Day Read More »

After a cyber-attack threat Moonfruit takes thousands of websites offline

Moonfruit a service that lets customers easily build templated websites has been threatened with a cyber-attack that has resulted in them taking thousands of business and personal websites offline. The company consequently told customers it had decided to take websites offline for “up to 12 hours” after they were hit by a distributed denial of

After a cyber-attack threat Moonfruit takes thousands of websites offline Read More »

Scroll to Top