Top Five Most Infamous DDoS Attacks

Top Five Most Infamous DDoS Attacks

| | A10 Networks, aws, ddos, GitHub, Mirai
Guest article by Adrian Taylor, Regional VP of Sales for A10 Networks  Distributed Denial of Service (DDoS) attacks are now everyday occurrences. Whether you’re a small non-profit or a huge multinational conglomerate, your online services—email, websites, anything that faces the internet—can be slowed or completely stopped by a DDoS attack. Moreover, ... Read More
Cyber Security Roundup for September 2020

Cyber Security Roundup for September 2020

A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, August 2020.Taking security training courses and passing certification exams are common ingredients in the makeup of the vast majority of accomplished cybersecurity and information security professionals. As such, ... Read More
Beating the Emotet Malware with SSL Interception

Beating the Emotet Malware with SSL Interception

Guest post by Adrian Taylor, Regional VP of Sales for A10 Networks  The Emotet trojan recently turned from a major cybersecurity threat to a laughingstock when its payloads were replaced by harmless animated GIFs. Taking advantage of a weakness in the way Emotet malware components were stored, white-hat hackers donned their ... Read More

Countering Cybercrime in the Next Normal

Guest post By Tom Kellermann, Head of Cybersecurity Strategy, VMware Carbon BlackCOVID-19 has reshaped the global cyberthreat landscape. While cyberattacks have been on the rise, the surge in frequency and increased threat sophistication is notable. The latest VMware Carbon Black Global Incident Threat Report, Extended Enterprise Under Threat – Global ... Read More
Book Review: Crime Dot Com, From Viruses to Vote Rigging, How Hacking Went Global

Book Review: Crime Dot Com, From Viruses to Vote Rigging, How Hacking Went Global

I had the great delight of reading Geoff White’s new book, “Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global”, I thoroughly recommend it. The book is superbly researched and written, the author’s storytelling investigative journalist style not only lifts the lid on the murky underground world ... Read More
Twitter confirms internal tools used in bitcoin-promoting attack ...

Cyber Security Roundup for August 2020

A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, July 2020.The standout hack of July 2020, and possibly of the year, was the takeover of 45 celebrity Twitter accounts, in a bid to scam their millions of ... Read More
Securing the COVID-19 'New Normal' of Homeworking

Securing the COVID-19 ‘New Normal’ of Homeworking

The COVID-19 pandemic has put into motion a scale of remote working never before seen. Our teams are no longer just grouped in different office locations – but working individually from kitchen tables, spare rooms and, for the lucky ones, home offices! It’s therefore inevitable that this level of remote ... Read More
Twitter confirms internal tools used in bitcoin-promoting attack ...

Twitter Hack & Scam

What Happened?Twitter confirmed 130 celebrity Twitter accounts were targeted in the cyberattack on Wednesday 15th July, with 45 successfully compromised. The hacked Twitter accounts included high profile individuals such as Barack Obama, Elon Musk, Kanye West, Bill Gates, Jeff Bezos, Warren Buffett, Kim Kardashian, and Joe Biden. Their accounts were ... Read More
Returning to the Workplace and the Ongoing Threat of Phishing Attacks

Returning to the Workplace and the Ongoing Threat of Phishing Attacks

Guest post by Richard Hahn, Consulting Manager, Sungard Availability Services According to the Office of National Statistics (ONS), approximately 14.2 million people (44% of the total number of working adults) have worked from home during the coronavirus pandemic. To put these figures into perspective, this number stood at around 1.7 ... Read More
iPhone Hacks: What You Need to Know About Mobile Security

iPhone Hacks: What You Need to Know About Mobile Security

Guest Post by Jennifer BellLearn How Hackers Steal and Exploit Information to Ensure This Doesn’t Happen to You Cybersecurity is an important topic to know and understand in order to keep your information safe and secure. Even more specifically, it’s important to know and understand mobile security as well. Mobile ... Read More