
Another Avalanche of Zero-Day Threats Has Arrived
Trevagh StankardA wave of new zero-day threats is plaguing WordPress, VMware, D-Link routers, and several other software applications.
A wave of new zero-day threats is plaguing WordPress, VMware, D-Link routers, and several other software applications.
Hackers don’t hack machines, they hack people. The rise in people online in 2020 has resulted in cyberattacks based on human behavior.
With Valentine's Day around the corner, cybercriminals are ramping up spam and phishing attacks targeting this lover's holiday.
A cyber-attack involving CLOP ransomware has caused major damage to a German manufacturer. Discover the facts your need to know about CLOP Ransomware.
Ransomware attacks are financially motivated cyber-attacks. These attacks are continually changing and new variants are constantly mutating. See the latest Ransomware trends.
A zero-day attack is a threat to which there is no defense in place. Zero-day attacks can be extremely harmful to an organization of any size.
The insurance industry has recently seen an increase in the number of targeted phishing attacks.This industry must have security defenses in place or they are at risk of attack.
Cyberattacks are currently soaring in the online retail sector. These businesses must protect themselves and their customers.
2020 saw the rise in the value of cryptocurrencies such as Bitcoin as a result we're seeing an increase in coin-mining malware.
Microsoft Office Security Updates Fix Critical SharePoint RCE Bugs.
A preventable cyber-incident was responsible for the death of a person in Germany. The hospital’s emergency services suffered down-time due to a ransomware attack.
The number of ransomware attacks increased by 40% in Q3 of 2020. This equates to almost 200 million infections, globally.
Data breaches are extremely dangerous and harmful to organizations and their customers. These attacks will not be declining in 2021.
PDF attachments have all been used by hackers. A new code-injection technique extracts sensitive data from PDF files such as payslips and e-tickets.
We discussed xxx domains in a blog post a few years ago - there has been much litigation and controversy since. In this article we revisit the .XXX Domain Controversy...
The WinZip application has been in operation for 30 years but failed to secure the business from a malware attack of a pop-up on the local network.
A phishing scam causing damages of $179 million shows why ignoring cybersecurity can cost an organization more money in the aftermath than the cost to implement it.
TrickBot is a trojan malware that was originally designed to target bank users. Recently, TrickBot has been associated with the distribution of ransomware in order to facilitate infection.
With the sudden increase in remote working in 2020, the rush to provide employees with a workable environment wasn’t thoroughly planned, leading to oversights in relation to cybersecurity.
TA416, a hacking group renowned for their innovative methods of malware delivery, are on the attack again. This latest phishing campaign is complicated, clever, and persistent.
2017 saw a 23.9% increase in cybersecurity incidents involving the healthcare industry with 3,442,7748 records compromised for the year. Why is the theft of millions of health records such a common occurrence?
Discovered in 2014, Emotet has had several iterations to avoid discovery from anti-malware programs. It’s made a comeback in 2020 as a major threat against to organizations.
Email services such as Office 365 are vulnerable to large volumes of credential stuffing attacks. These are highly scaled attacks designed to find the weakest link quickly and easily.
As cybercriminals up their game and use more sophisticated and novel techniques to steal and plunder data and systems, what tools can help an organization fight back?
Zoom Users Beware: New sextortion email scam circulating. This scam is part of the ongoing exploitation of changing working patterns and new modes of collaboration.
Firewalls, access controls, user identity management, and other network fundamentals are all components in good cyber security posture. What’s missing in this list and often overlooked is email cyber...
Administrators must offer a work-from-home environment, but it must be done with cybersecurity as a priority. In a new ThreatPost report, researchers saw a 131% increase in viruses spread across the...
2020 has seen a 30% increase in cyber attacks between the months of July and August when a record 1,746,611 cyber attacks were recorded in a 24 hour period on August 18. This blog looks...
It’s easy to fall victim to phishing attacks targeting collaboration tools like Teams, the phishing page is made to look like the Teams login page. Users who do not...
Phishing is as much about human behavior as it is about technology. Cybercriminals know that tricking users into performing an action can effectively do the hard work for them.
The latest Office 365 phishing scam has three core elements that together make it a cyber-attack that is very difficult to detect and prevent.
Over his 36 year IT career Steve Havert has encountered and overcome many IT security issues. Has ransomware been the most challenging?
Ransomware is one of the worst malware threats in the wild, costing millions in data loss and disaster recovery. Organizations must strengthen defenses as new variants become ever more devious.
Cyber-threats are a 360-degree problem. As such, an enterprise needs to tackle them across all entry points, including web-based attack points.
Palmerworm hackers have been hiding in corporate networks for months. Palmerworm uses a unique approach to tricking users into running malicious content.
DNS-based filtering is vital for the safe provision of Internet access to University students and employees - currently a major target for attack.
To protect Office 365 users we can turn to content filtering technology or more specifically DNS Filtering, but why is it needed, and how can it help?
Keeping employee communications smooth and unhindered has meant that email has taken a central seat at the technology table. How to manage corporate emails to ensure compliance, security, and privacy?
On Tuesday, 22nd September, 2020 we're running an exclusive webinar. Sign up to learn 'How to Ensure Business Continuity with Email Archiving for your Remote Workforce'.
At the start of the pandemic, 40% of MSPs expected to reduce their growth projection by at least 10%. Many MSPs are expecting a 'flat' year.
Cybercriminals are taking advantage of the COVID-19 pandemic and unleashing targeted BEC attacks. Scams are designed to trick victims into transferring data or funds to the scammers.
Defending sensitive data takes the right configurations, but even more important is the right security and detection tools. Cybersecurity should be proactive rather than reactive to avoid major data breaches.
Here's 15 of TitanHQ's Top free resources for system administrators, network admins and managed service providers
In this blog, we provide tips and insights into how MSP’s can thrive, not just survive, during these challenging times.
TitanHQ are in the process of deploying new and vastly improved ArcTitan systems in the EU and US. We will be migrating existing ArcTitan accounts to these systems.
In this article we examine recent research into how MSPs are adapting to COVID-19 and other challenges that so many companies are forced to deal with.
Phishing and social engineering attacks make much more work for MSPs who must detect, contain, and eradicate any malicious activity on a corporate network.
As Zoom and other communication software use increases, hackers find ways to exploit vulnerabilities. Vulnerable conferencing software is just one attack vector that is being used to eavesdrop on data.
Sign-up for email updates...
Call us on USA +1 813 304 2544 or IRL +353 91 545555
Contact Us