
A deepfake is a video or image produced by a neural network that attempts to perfectly capture the likeness of someone else. Similar technologies have been used by film production companies to recreate the likeness of actors, for example in Lucasfilms' CGI Carrie Fisher and Peter Cushing. However, Deepfakes also represent a real threat to businesses as a vishing technique - phishing using voice and video...
Read more
it has become essential to practice good cyber hygiene in order to avoid falling victim to scams and attacks. Today we will be going through some of the best practices which you should be doing to keep yourself safe online.
Read more
Ransomware attacks show no signs of slowing down. Discover 5 of the most severe attacks that occurred in 2022.
Read more
In this day and age of ever growing utilisation of, and reliance upon, digital platforms and apps our digital footprint can only grow. As a result of this, it becomes more and more important that we all practice good password hygiene. A secure password significantly reduces the risk of unauthorised access to our accounts and devices, keeping our personal information secure
Read more
Cybercriminals have taken advantage of this newly popular technology by replacing trustworthy QR codes with malicious ones that infect devices or divert users to a phishing website that appear legitimate to entice users into handing over personal information.
Read more
In this modern world there is an app for everything. Easy access to a variety of free apps for our smartphones and tablets, with millions available on the Google Play Store*, gives cybercriminals an opportunity to find new ways of infiltrating our devices and getting hold of sensitive data. Since bad actors have established methods to get past the Google Play Store’s security scans put into place to protect its users, deceptively innocent looking applications containing malware known as droppers have entered the scene.
Read more
Browser Extensions can improve the convenience, productivity, and efficiency of browsers; however, they are not always secure as they look and can pose a significant challenge to cybersecurity. As a matter of fact, extensions can be easily downloaded with just one click, typically have full access to the contents of any web page the user loads and can handle sensitive data. This has made extensions a valuable target for threat actors.
Read more
The cyber threat landscape has undergone many shifts in the past year, from the involvement of ransomware cyber gangs in hacktivist activity during the war between Russia and Ukraine, to the disappearance from the scene of the most prolific ransomware groups. These include DarkSide, the hacker group behind the Colonial Pipeline attack, and REvil, One of the groups that has been active since 2019 and continues to grow regardless of the shifts in the cyber threat landscape is the LockBit gang.
Read morePlease fill in the form below (fields with * are mandatory) and we will respond to your request as soon as possible!