The Underground Market for Stolen Personal Data is Booming
Geraldine HuntData breaches resulting in stolen usernames and passwords being “traded like Pokémon cards” can be extremely costly, what can an IT professional do to prevent?
Data breaches resulting in stolen usernames and passwords being “traded like Pokémon cards” can be extremely costly, what can an IT professional do to prevent?
Stay up to date with the latest ransomware attacks and threats in order to protect your organization. Learn about RansomExx, the newest and largest ransomware gang currently attacking high-profile organizations.
LinkedIn users have been targeted with fake job offer scams from fake or synthetic profiles, used to represent themselves as a recruitment agent or a senior person in a company....
Cybersecurity threats are ever-rising. Secure your organization for the year ahead and take a look at the predicted cybersecurity themes of 2021.
Phishing attacks have surged by 667% due to the effects of COVID-19 lockdowns and remote working.
A cyberattack hacked dozens of email accounts in the U.S. Treasury Department, as part of the SolarWinds attack.
The proliferation of mobile devices demands a new type of web filtering architecture which is why cloud-based filtering solutions are quickly becoming so popular.
A wave of new zero-day threats is plaguing WordPress, VMware, D-Link routers, and several other software applications.
A cyber-attack involving CLOP ransomware has caused major damage to a German manufacturer. Discover the facts your need to know about CLOP Ransomware.
Ransomware attacks are financially motivated cyber-attacks. These attacks are continually changing and new variants are constantly mutating. See the latest Ransomware trends.
A zero-day attack is a threat to which there is no defense in place. Zero-day attacks can be extremely harmful to an organization of any size.
Cyberattacks are currently soaring in the online retail sector. These businesses must protect themselves and their customers.
2020 saw the rise in the value of cryptocurrencies such as Bitcoin as a result we're seeing an increase in coin-mining malware.
Microsoft Office Security Updates Fix Critical SharePoint RCE Bugs.
A preventable cyber-incident was responsible for the death of a person in Germany. The hospital’s emergency services suffered down-time due to a ransomware attack.
The number of ransomware attacks increased by 40% in Q3 of 2020. This equates to almost 200 million infections, globally.
PDF attachments have all been used by hackers. A new code-injection technique extracts sensitive data from PDF files such as payslips and e-tickets.
We discussed xxx domains in a blog post a few years ago - there has been much litigation and controversy since. In this article we revisit the .XXX Domain Controversy...
The WinZip application has been in operation for 30 years but failed to secure the business from a malware attack of a pop-up on the local network.
A phishing scam causing damages of $179 million shows why ignoring cybersecurity can cost an organization more money in the aftermath than the cost to implement it.
TrickBot is a trojan malware that was originally designed to target bank users. Recently, TrickBot has been associated with the distribution of ransomware in order to facilitate infection.
With the sudden increase in remote working in 2020, the rush to provide employees with a workable environment wasn’t thoroughly planned, leading to oversights in relation to cybersecurity.
TA416, a hacking group renowned for their innovative methods of malware delivery, are on the attack again. This latest phishing campaign is complicated, clever, and persistent.
2017 saw a 23.9% increase in cybersecurity incidents involving the healthcare industry with 3,442,7748 records compromised for the year. Why is the theft of millions of health records such a common occurrence?
Discovered in 2014, Emotet has had several iterations to avoid discovery from anti-malware programs. It’s made a comeback in 2020 as a major threat against to organizations.
Email services such as Office 365 are vulnerable to large volumes of credential stuffing attacks. These are highly scaled attacks designed to find the weakest link quickly and easily.
As cybercriminals up their game and use more sophisticated and novel techniques to steal and plunder data and systems, what tools can help an organization fight back?
Zoom Users Beware: New sextortion email scam circulating. This scam is part of the ongoing exploitation of changing working patterns and new modes of collaboration.
Firewalls, access controls, user identity management, and other network fundamentals are all components in good cyber security posture. What’s missing in this list and often overlooked is email cyber...
Administrators must offer a work-from-home environment, but it must be done with cybersecurity as a priority. In a new ThreatPost report, researchers saw a 131% increase in viruses spread across the...
2020 has seen a 30% increase in cyber attacks between the months of July and August when a record 1,746,611 cyber attacks were recorded in a 24 hour period on August 18. This blog looks...
It’s easy to fall victim to phishing attacks targeting collaboration tools like Teams, the phishing page is made to look like the Teams login page. Users who do not...
Phishing is as much about human behavior as it is about technology. Cybercriminals know that tricking users into performing an action can effectively do the hard work for them.
The latest Office 365 phishing scam has three core elements that together make it a cyber-attack that is very difficult to detect and prevent.
Over his 36 year IT career Steve Havert has encountered and overcome many IT security issues. Has ransomware been the most challenging?
Ransomware is one of the worst malware threats in the wild, costing millions in data loss and disaster recovery. Organizations must strengthen defenses as new variants become ever more devious.
Cyber-threats are a 360-degree problem. As such, an enterprise needs to tackle them across all entry points, including web-based attack points.
Palmerworm hackers have been hiding in corporate networks for months. Palmerworm uses a unique approach to tricking users into running malicious content.
To protect Office 365 users we can turn to content filtering technology or more specifically DNS Filtering, but why is it needed, and how can it help?
Keeping employee communications smooth and unhindered has meant that email has taken a central seat at the technology table. How to manage corporate emails to ensure compliance, security, and privacy?
On Tuesday, 22nd September, 2020 we're running an exclusive webinar. Sign up to learn 'How to Ensure Business Continuity with Email Archiving for your Remote Workforce'.
At the start of the pandemic, 40% of MSPs expected to reduce their growth projection by at least 10%. Many MSPs are expecting a 'flat' year.
Cybercriminals are taking advantage of the COVID-19 pandemic and unleashing targeted BEC attacks. Scams are designed to trick victims into transferring data or funds to the scammers.
Defending sensitive data takes the right configurations, but even more important is the right security and detection tools. Cybersecurity should be proactive rather than reactive to avoid major data breaches.
Here's 15 of TitanHQ's Top free resources for system administrators, network admins and managed service providers
In this blog, we provide tips and insights into how MSP’s can thrive, not just survive, during these challenging times.
TitanHQ are in the process of deploying new and vastly improved ArcTitan systems in the EU and US. We will be migrating existing ArcTitan accounts to these systems.
In this article we examine recent research into how MSPs are adapting to COVID-19 and other challenges that so many companies are forced to deal with.
Sign-up for email updates...