News & Blogs
-
Cyber Essentials: Strengthening Your Digital Defences
In todays interconnected world, safeguarding your organisation against cyber threats is paramount... -
Beyond the Surface: An Introduction to the Dark Web
The dark web is a part of the internet that is intentionally hidden and inaccessible through standard web browsers and search engines.... -
Securing Success: Implementing Cybersecurity into Your Business Strategy
The biggest driver for innovation in our business has been digitisation. Like all companies across the world, we are embracing those technologies that can help us become more efficient, help us communicate better and deliver higher levels of customer... -
Top Tips for Phishing Defense: Strengthening Your Cyber Armor
The origin of phishing can be traced back to the mid-1990s, when the word first appeared in a Usenet newsgroup called AOHell.... -
Unlocking Cybersecurity’s Future
Artificial Intelligence (AI) has significant implications for the future of cyber security. It is both a tool that can enhance cybersecurity measures and a potential threat vector that cybercriminals may exploit.... -
Cybersecurity Predictions for 2024
AIs value is rooted in the breadth and reliability of data, which Cybersixgill predicts will significantly improve in 2024 as AI vendors advance the richness and fidelity of results.... -
Understanding IT security
T security is an umbrella term that includes network, internet, endpoint, application programming interface (API), cloud, application, container security and more.... -
IT Support Services
We caught up with Mark from Cookstown Panel Centre to hear how important our IT Support services are to their business operations.... -
Illinois Hospital Blames Ransomware Attack for Unprecedented Closure
St. Margarets Health in Spring Valley, Illinois, will permanently shut down as a result of a debilitating cyberattack, making it the first hospital to publicly attribute its closure to criminal hackers.... -
What is Business Email Compromise (BEC)? Risks and Best Practices to Mitigate Against It
Business Email Compromise is a type of cybercrime where an attacker gains access to a companys email system or an employee account and uses it to conduct fraudulent activities.... -
Zero-Day Alert: Google Issues Patch for New Chrome Vulnerability – Update Now!
On Monday 5th June 2023, Google released security updates to patch a high-severity flaw in its Chrome web browser that it said is being actively exploited in the wild.... -
SAS Airlines hackers ransom demand up again – now $10M
Anonymous Sudan, the pro-Russian hacker group that has been targeting SAS Airlines for more than a week, has increased its ransom demand again this time to $10 million.... -
Data Stealing Malware Discovered in Popular Android Screen Recorder App
Google has removed a screen recording app named iRecorder Screen Recorder from the Play Store after it was found to sneak in information stealing capabilities nearly a year after the app was published as an innocuous app... -
Legion Malware Upgraded to Target SSH Servers and AWS Credentials
An updated version of the commodity malware called Legion comes with expanded features to compromise SSH servers and Amazon Web Services (AWS) credentials associated with DynamoDB and CloudWatch.... -
Predator Android Spyware Researchers Uncover New Data Theft Capabilities
Security researchers have detailed the inner workings of the commercial Android spyware called Predator, which is marketed by the Israeli company Intellexa (previously Cytrox).... -
U.K. Fraudster Behind iSpoof Scam Receives 13-Year Jail Term for Cyber Crimes
U.K. national responsible for his role as the administrator of the now-defunct iSpoof online phone number spoofing service has been sentenced to 13 years and 4 months in prison.... -
Discord discloses data breach after support agent got hacked
Discord is notifying users of a data breach that occurred after the account of a third-party support agent was compromised.... -
Serious Unpatched Vulnerability Uncovered in Popular Belkin Wemo Smart Plugs
The second generation version of Belkins Wemo Mini Smart Plug has been found to contain a buffer overflow vulnerability that could be weaponised by a threat actor to inject arbitrary commands remotely.... -
What is Ransomware as a Service (RaaS)?
Ransomware as a Service, or RaaS, is a type of cybercrime that has become increasingly popular in recent years... -
Why You Need Cyber Security as a Service: The Benefits and the Impacts Cyber Threats Can Have on Your Business
Businesses have budget cost lines for the usual things like PCs, CCTV, Phones etc. However, cyber security should be considered as the number one budget cost line priority now, as there is no point in having the other items when your business operati... -
Former Uber Chief Security Officer Convicted for Concealing Cyber Hack
Ubers former chief security officer has been convicted of failing to tell US authorities about a 2016 hack of the companys databases....