CyberSecurity

Apr
21
The Rising Threat: How APT Actors are Targeting MFA Systems

The Rising Threat: How APT Actors are Targeting MFA Systems

Multi-factor authentication (MFA) is a security measure that prevents unauthorised access to sensitive information in the constantly changing cybersecurity world.
2 min read
Apr
06
Understanding and Overcoming Breach Fatigue.

Understanding and Overcoming Breach Fatigue.

Data breaches have become common in the ever-evolving landscape of cyber threats. For IT leaders, the constant barrage of news
2 min read
Mar
26
Understanding Domain Permutation and Protecting Your Brand with Dnstwist

Understanding Domain Permutation and Protecting Your Brand with Dnstwist

In the digital age, the security of a brand's domain name is paramount. Cybercriminals often exploit similar-looking domain
2 min read
Mar
16
The Dark Side of Shiny: Why Cybersecurity Experts are Moonlighting for the Bad Guys

The Dark Side of Shiny: Why Cybersecurity Experts are Moonlighting for the Bad Guys

Imagine this: a seasoned security professional, let's call him Alex, sits down at his computer after a long
3 min read
Mar
03
How to Protect Your Business from Email Compromise in a Changing Cybersecurity Landscape

How to Protect Your Business from Email Compromise in a Changing Cybersecurity Landscape

Business email compromise (BEC) is a cyberattack that targets organisations to steal money or critical information. The attacker impersonates a
2 min read
Feb
22
How to Avoid Being Scammed with Fake Calls

How to Avoid Being Scammed with Fake Calls

Fake calls are a common and dangerous form of fraud that can cost you money, time, and peace of mind.
4 min read
Feb
11
Why You Should Run Tabletop Exercises for Cybersecurity

Why You Should Run Tabletop Exercises for Cybersecurity

Cybersecurity is not just about having the right tools and policies in place. It is also about how you and
2 min read
Jan
13
How to go passwordless with yubykey, Dashlane and iPhone

How to go passwordless with yubykey, Dashlane and iPhone

Passwords are a hassle. They are hard to remember, easy to forget, and often vulnerable to hackers. That's
3 min read
Dec
09
What is Credential Stuffing and How to Protect Yourself

What is Credential Stuffing and How to Protect Yourself

Credential stuffing is a type of cyberattack that exploits the reuse of usernames and passwords across different websites and applications.
3 min read
Dec
09
Log4j The pain persists

Log4j The pain persists

The log4j vulnerability, also known as Log4Shell, is a serious flaw in a widely used Java logging library that allows
2 min read