Blog
Articles on cyber-security and latest trends
FEATURED POSTS

How Effective Is Security Training in Preventing Cyber Attacks?

Do your security controls work?
-
Covert redirect attacks and how to get protected against them
Open redirects fail to determine whether the redirected URL is valid. Cybercriminals exploit this flaw by opening a fake login window, stealing login information, and redirecting to a malware-infringing page. This type of phishing attack was first discovered in June 2014 by Wang Jing at Nanyang University of Technology.
-
How Effective Is Security Training in Preventing Cyber Attacks?
A phishing attack is responsible for more than 91% of system breaches. Spear phishing, a targeted attack against a specific individual, has become popular. Organizations require employee awareness training as well as a combination of technical solutions to protect against email cyber-attacks.
-
The last hunt of social engineering: Uber
A young hacker allegedly broke into Uber’s network last week using social engineering attacks. He gained access to a staff member’s Slack login and utilized it to inform Uber staff that there had been a data breach. Uber noticed this and within hours, it published additional facts quickly confirming the hack on Twitter. Uber asserts […]
-
Black Hat Fireside Chat: Deploying ‘AI’ as a weapon to win the ‘attack surface management’ war
An advanced weapon is emerging that uses data analysis to hone systems and suppress attacks. Darktrace’s artificial intelligence solutions can help companies restrict access to APIs, neutralize shady IT, protect supply chains and even improve the efficiency of DEVSECOPYRIGHTs.
-
General Bytes Suffer Cyberattack
A cyberattack took advantage of a previously unknown flaw in General Bytes software. CAS allows businesses to manage Bitcoin ATMs from a centralized location via a desktop computer or a browser on a mobile device.
-
FIRESIDE CHAT: ‘Attack surface management’ has become the centerpiece of cybersecurity
After COVID-19, the management of the attack surface has become the main focus of the protection of the corporate network. This includes the implementation of new security systems, such as access to the zero trust network. Jess Byrne, senior analyst at Forrester, on the implications of cybersecurity.
-
Friday Squid Blogging: The Language of the Jumbo Flying Squid
The giant flying squid (Dosidicus Gigas) shows 12 different pigmentation patterns in different sequences, similar to how humans arrange words in a sentence. Researchers suggest that these pigmentation changes in the body signal a definite action, such as “I’m about to attack”.
-
USB “Rubber Ducky” Attack Tool
Rubber Ducky can inject commands that a USB device will inject into the target machine. DuckyScript 3.0 is a feature-rich language that allows users to write functions and store variables. It can perform a test to check whether a device is connected to a Windows or Mac computer.
-
Recovery From NHS Attack Could Take Weeks
Advanced, a key IT partner of the NHS, was attacked by ransomware last week. Company said it could take three to four weeks for systems to resume normal operation. Advanced manages many important systems in the health sector including the NHS 111 and other emergency departments. The UK government downplayed the severity of the incident.
-
FIRESIDE CHAT: ‘Attack surface management’ has become the centerpiece of cybersecurity
Managing anval oppervlacte is a uitgegroeid tot het middelpunt van de verdediging van bedrijfsnetwerken. This means getting a complete view of all possible links to sensitive cyber actions, proactively managing software vulnerabilities and detecting and responding to real attacks.
-
Meta Take Action Against Two Cyber Espionage Operations in South Africa
Meta said measures have been taken against two cyber espionage operations in South Africa. This was made by the company last Thursday in its quarterly conflict threat report. Bitter used a variety of malicious tactics to target people online through social engineering and infect their devices with malware.
-
7-Eleven Stores in Denmark Close After Cyberattack
Denmark’s 7-Eleven stores closed yesterday after a cyber attack. Pay and order systems disrupted in stores across the country. Cyber attack took place in the early morning of August 8, company said it was probably a ‘hacker attack’, according to Facebook post.






