Common focal points of DoS attacks

This blog was written by an independent guest blogger. Is your company at risk of a Denial of Service (DoS) attack? If so, which areas are particularly vulnerable? Think it’s a crazy question? Think again. In 2020, 16 DDoS attacks take place every minute. DoS attacks require fewer resources, and so pose an even greater threat. In this post, we’ll discuss what a DoS attack is and how it differs from a Distributed Denial of Service (DDoS) attack.


Ecommerce Security - NutriBullet & Tupperware Suffer Magecart Attacks

The COVID-19 virus epidemic has seen a 23% rise in visitors to UK independent ecommerce sites and similarly, on a global scale, many companies have transitioned to fully ecommerce-based business practice and are seeing an increase in online shoppers. Additionally, employees are either remote working, self-isolating or ill. This pivot in business continuity means websites are increasingly vulnerable to being attacked.


How Cybercriminals Are Actively Exploiting the Coronavirus/COVID-19 Crisis

Security researchers around the world have their work cut out for them keeping track of malicious scams and campaigns surrounding the coronavirus. Cybercriminals are unabashedly pulling out all the stops to take advantage of a weary (and largely remote-working) public to spread malware, siphon sensitive information, hold critical systems hostage and line their coffers with ill-gotten gains.


Coronavirus Impact on Cyber Security

The Coronavirus (COVID-19) pandemic is increasing tremendously and disrupting the global health at large extent, in addition to the damages to economics, social and political systems. More importantly, the digital world is also on the verge of destruction because, due to this menace, the people at large scale are compelled to work remotely and doing so will make them rely heavily on remote communication and digital tools.


What is a Smurf Attack?

A smurf attack is a type of DDos attack that aims to create high traffic on your network and harm your organization. Read more to learn how you can avoid such attacks. What is a smurf attack? A smurf attack is a type of DDoS attack that consumes the essential resources of your network through the utilization of ICMP Echo mechanism. In other words, an attacker tries to flood a server with ICMP packets in order to render it inaccessible.


How to harden your employees from the massive social engineering threat

Social engineering is the art of human deception. In the world of cybersecurity, it’s how to fool human beings in order to conduct cyber attacks. Some of these cyber attacks can be very expensive to your business! In fact, many of the worst cyber attacks to your organization’s network start with fooling you or one of your employees. Penetrating a network without human interaction is really tough.


Understanding cyber attacker motivations to best apply controls

Implementing a risk based security program and appropriate controls against adaptive cyber threat actors can be a complex task for many organizations. With an understanding of the basic motivations that drive cyber-attacks organizations can better identify where their own assets may be at risk and thereby more efficiently and effectively address identified risks.


Redcar Council Services Hit by Cyber Attack

A local authority in northeastern England has suffered a major ransomware attack, leaving online public services unavailable for over 135,000 residents for over a week. As of now, the website for Redcar Cleveland Borough Council is still down. An update was published on Monday February 17, stating we are experiencing issues with our IT systems and are still able to receive and answer limited calls and emails. The company is currently having to prioritize messages based on urgency.


What is a Whaling Attack?

A whaling attack is a type of phishing attack that targets high-level executives, such as the CEO or CFO, to steal sensitive information from a company. This could include financial information or employees' personal information. The reason whaling attacks target high-ranking employees is because they hold power in companies and often have complete access to sensitive data.


Top 5 Harmful Cyber Threat Types

Cybersecurity threats are evolving and the IT industry is on high alert. Modern cyber threats are more sophisticated and fast such as malware, phishing, cryptojacking, and IoT threats. The major cyber-attacks in 2019 witnessed that cybersecurity defenses were inefficient to prevent cyber threats altogether. The situation will even prevail in 2020. However, mitigation strategies can help to minimize the chances of data breaches.