Doxxing-as-a-Service (DaaS) is now a real and genuine threat that people need to be aware of, as it has become cheaper and simple to hire the service of a doxing group. DaaS enables identity fraud, spear phishing, malware deployment and even personal endangerment of its victims. In this article, we take a look at the types of DaaS services now on offer, and discuss ways that you may be able to protect yourself or mitigate the damage done by a dox.
Read moreWhile a set of login credentials stolen from a personal account can cause a big inconvenience for an individual in the form of identity theft and financial loss, the same set of credentials taken from an employee’s company account can cause much larger-scale disruptions and financial losses to the company and its customers, as well as putting other employees and customers at risk. In this case, a simple password change might not cut it.
Read moreIn May 2023 a vulnerability in the MOVEit file transfer application resulted in data from thousands of organisations being stolen by the ransomware group known as CL0P, in a ransomware attack that could affect hundreds of millions of people.
Read moreChatbots have been around for years already, but in the rapidly evolving landscape of artificial intelligence (AI) and machine learning, they have emerged as powerful tools that enhance customer service, streamline business operations, and provide personalized user experiences. However, alongside their legitimate uses, a darker side has emerged: bad actors have begun to proliferate fraudulent AI tools and chat bots.
Read moreIoT adoption is expanding across all industries, but there are several risks associated with IoT. In this article we explain how to mitigate risks and protect businesses from cyberattacks exploiting these new vulnerabilities.
Read moreIn this article, we will take a look at the current state of cyberwarfare in areas where it is most prevalent, and discuss whether we have seen the technological advancement that was theorised.
Read moreThe evolution of banking droppers poses a serious threat to Android users’ financial privacy, as cybercriminals are able to constantly develop new tactics to bypass security measures and steal victims’ banking data. Starting from two notorious malware like Xenomorph and Sharkbot, this article explores the recent developments of this cyber phenomenon, providing essential tips for prevention and remediation.
Read moreBlackCat is considered to be one of the most dangerous and sophisticated ransomware groups. Since their first appearance in 2021, they’ve been able to carry out attacks against high-profile organisations. However, a recent, suspicious incident involving a large ransom payment has cast a shadow on their future.
Read morePlease fill in the form below (fields with * are mandatory) and we will respond to your request as soon as possible!