Cyber Security Breaches: Causes & Solutions

As technology advances and more of our lives move online, cyber security breaches have become more common. Unfortunately, this has increased the risk of businesses, organisations and individuals suffering from financial loss and a damaged reputation. In this blog post we will explore the causes of cyber security breaches as well as the impacts they … More Cyber Security Breaches: Causes & Solutions

Beyond the blue screen of death: Why software updates matter

The widespread IT outages triggered by a faulty CrowdStrike update have put software updates in the spotlight. Here’s why you shouldn’t dread them. In the realm of computing, few things are as unsettling as encountering a blue screen of death (BSOD) on your Windows system. The ominous screen with its cryptic error messages evokes a … More Beyond the blue screen of death: Why software updates matter

Global IT outage hits companies around the as planes grounded and train services affected

Businesses including banks, airlines, train companies, telecommunications companies, TV and radio broadcasters, and supermarkets have been affected by a mass global IT outage. Major US airlines including American Airlines, Delta Airlines and United Airlines have been grounded, while airports in Germany, Amsterdam and Spain are also reporting issues. It is believed the outage is related … More Global IT outage hits companies around the as planes grounded and train services affected

HotPage browser injector capable of replacing web content and redirecting users

HotPage browser injector is capable of replacing web content and opens the system to other vulnerabilities. ESET Research has discovered a sophisticated browser injector: This threat, which ESET dubbed HotPage, comes self-contained in an executable file that installs its main driver and injects libraries into Chromium-based browsers. Posing as a security product capable of blocking … More HotPage browser injector capable of replacing web content and redirecting users

Small but mighty: Top 5 pocket-sized gadgets to boost your ethical hacking skills

These five formidable bits of kit that can assist cyber-defenders in spotting chinks in corporate armors and help hobbyist hackers deepen their understanding of cybersecurity. While blue teams defend, red teams attack. They share a common goal, however – help identify and address gaps in organizations’ defenses before these weaknesses can be exploited by malicious … More Small but mighty: Top 5 pocket-sized gadgets to boost your ethical hacking skills