top of page

Aug 2, 2022
Ransomware attacks decrease?
An unexpected slowdown in ransomware attacks due to volatility in cryptocurrency markets and law-enforcement focus.


Jul 31, 2022
Attackers find new ways to bypass Microsoft's macro protection
Threat actors are increasingly using container files such as ISO, RAR and LNK shortcuts to distribute Office macro malware.


Jul 31, 2022
Mobile apps are increasingly important but are we aware of cyber risks?
Mobile apps in production are vulnerable to threats, but the risks receive lower priority and funding.


Jul 31, 2022
Cyber Security: Threats and Challenges of Digital Ecosystems
A survey of 600 cyber executives highlights changing attitudes to cyber security and infrastructure.


Jul 29, 2022
Exfiltrating data via browser bookmark sync
Another adversary technique highlighted by SANS institute researches points to stealth data exfiltration.


Jul 29, 2022
Linkedin the most impersonated brand in phishing attacks
Social network LinkedIn, along with Microsoft and DHL are the most frequently impersonated brands in phishing attacks.


Jul 28, 2022
Hackers breached Entrust’s network in June
Entrust corporation experiences data security incident potentially exposing sensitive data.


Jul 27, 2022
PLC and HMI 'password cracker' delivers malware
Industrial devices are getting the attention of threat actors, as evidenced in this campaign.


Jul 26, 2022
Weak authentication practices in popular SaaS apps
Research reveals how poor authentication requirements can be even in popular SaaS applications such as Shopify, Zendesk, Trello and others.
bottom of page