Cyber Security Kill Chain

In our recent blog post "Multi-Phase Cyber Attacks" we described how cyber attacks are often not a single instance but part of a planned attack that can be sustained over several months, even years. An attack may only become apparent when the cyber attacker makes themselves known through some form of visible attack, a security... Continue Reading →

Risks Associated with Ghost/Inactive Accounts

Ghost accounts, depending on context, have various definitions. A Ghost Account can be: A social media account made solely to view other people's contentAn inactive account that is still live but has either been forgotten about or is seldom used. Ghost Social Media Accounts People make ghost accounts on social media platforms for a variety... Continue Reading →

A Review of 2020

As we come to the end of 2020, is is customary to review what has happened in the previous 12 months and learn from any events that happened. At the beginning of 2020, no one could have foreseen the chaos that the novel coronavirus COVID-19 would bring. While the start of it was in China... Continue Reading →

COVID-19 Vaccine Scam

Updated 16 January 2021 Never let a good crisis go to waste - at least this is what Cyber criminals and Scammers have been doing all this year in relation to the COVID-19 pandemic. There have been multiple scams and cyber attacks relating to the pandemic (we will review some of them in our 2020... Continue Reading →

Threat & Incident Lifecycle Management

It is a good investment to invest in a Threat & Incident Lifecycle Management Procedure since cyber threats show no sign of slowing down. This post is focused on what organisations can do to detect cyber threats, but this will also be useful for individuals and consumers. What is Threat & Incident Lifecycle Management? The... Continue Reading →

Multi-Phase Cyber Attacks

A lot of people think that a cyber attack is immediately launched when you click on a link, or a hacker exploits a zero day vulnerability. This is not always the case and recent evidence shows that hackers are hiding in plain sight and waiting to launch their ultimate attack. Malware can infiltrate your systems... Continue Reading →

Cyber Security during a Pandemic

Just about everyone on the planet knows now that we have a COVID19 (Coronavirus) pandemic on our hands. However, cyber criminals are taking advantage of this current crisis, and people's fears, to spread malware. I will post a list of validated and legitimate news sources at the end of this blog. What are Cyber Criminals... Continue Reading →

Social Media Auditing & Reporting

It's amazing what you find on Twitter. Shortly after posting my blog on how Google indexes all of your public tweets, I came across a tweet where someone had applied for a job and the company performed an audit on his tweets. They delivered a 300+ page PDF of all his tweets including a certain... Continue Reading →

What is Cyber Warfare?

What with the current news around the events in Iran, the security level has been raised across most of the western world. With the heightened security levels, we can also expect cyber attacks from nation state actors based in Iran and the middle east on western infrastructure. This blog has been in my backlog for... Continue Reading →

Myths of Cyber Security

I have found there is a general perception among people that they won't be hit by a cyber attack of some form and that cyber security is not something they need to worry about too much, after all you have installed an Internet Security product on your PC and you download apps from the official... Continue Reading →

Cyber Attacks 101 – A Pocket Guide

A Cyber attack is any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to, or make unauthorized use of, a computer system. This can be anything from big servers to your smartphone and anything in between. There are various forms of Cyber Attack. The following list are just examples: Brute Force Attack/Dictionary... Continue Reading →

Malware 101 – A Pocket Guide

This post is a general round up of the various types of malware that is in circulation today. Typical types of malware are: BackdoorsFile-less MalwareKey Loggers Ransom Ware Root Kits Trojan HorsesViruses WipersWorms. This can also include social engineering methods, which are often used to get the first foothold in installing some form of malware.... Continue Reading →

Create a website or blog at WordPress.com

Up ↑