The Booming Business of Ransomware
Trevagh StankardRansomware attacks have been rising year-on-year, but are they really that successful? Discover how Ransomware is a booming business in this article.
Ransomware attacks have been rising year-on-year, but are they really that successful? Discover how Ransomware is a booming business in this article.
With the sudden increase in remote working in 2020, the rush to provide employees with a workable environment wasn’t thoroughly planned, leading to oversights in relation to cybersecurity.
TA416, a hacking group renowned for their innovative methods of malware delivery, are on the attack again. This latest phishing campaign is complicated, clever, and persistent.
Discovered in 2014, Emotet has had several iterations to avoid discovery from anti-malware programs. It’s made a comeback in 2020 as a major threat against to organizations.
Email services such as Office 365 are vulnerable to large volumes of credential stuffing attacks. These are highly scaled attacks designed to find the weakest link quickly and easily.
As cybercriminals up their game and use more sophisticated and novel techniques to steal and plunder data and systems, what tools can help an organization fight back?
Zoom Users Beware: New sextortion email scam circulating. This scam is part of the ongoing exploitation of changing working patterns and new modes of collaboration.
Firewalls, access controls, user identity management, and other network fundamentals are all components in good cyber security posture. What’s missing in this list and often overlooked is email cyber...
Administrators must offer a work-from-home environment, but it must be done with cybersecurity as a priority. In a new ThreatPost report, researchers saw a 131% increase in viruses spread across the...
2020 has seen a 30% increase in cyber attacks between the months of July and August when a record 1,746,611 cyber attacks were recorded in a 24 hour period on August 18. This blog looks...
It’s easy to fall victim to phishing attacks targeting collaboration tools like Teams, the phishing page is made to look like the Teams login page. Users who do not...
Phishing is as much about human behavior as it is about technology. Cybercriminals know that tricking users into performing an action can effectively do the hard work for them.
The latest Office 365 phishing scam has three core elements that together make it a cyber-attack that is very difficult to detect and prevent.
Cyber-threats are a 360-degree problem. As such, an enterprise needs to tackle them across all entry points, including web-based attack points.
Palmerworm hackers have been hiding in corporate networks for months. Palmerworm uses a unique approach to tricking users into running malicious content.
To protect Office 365 users we can turn to content filtering technology or more specifically DNS Filtering, but why is it needed, and how can it help?
Keeping employee communications smooth and unhindered has meant that email has taken a central seat at the technology table. How to manage corporate emails to ensure compliance, security, and privacy?
On Tuesday, 22nd September, 2020 we're running an exclusive webinar. Sign up to learn 'How to Ensure Business Continuity with Email Archiving for your Remote Workforce'.
At the start of the pandemic, 40% of MSPs expected to reduce their growth projection by at least 10%. Many MSPs are expecting a 'flat' year.
Cybercriminals are taking advantage of the COVID-19 pandemic and unleashing targeted BEC attacks. Scams are designed to trick victims into transferring data or funds to the scammers.
Defending sensitive data takes the right configurations, but even more important is the right security and detection tools. Cybersecurity should be proactive rather than reactive to avoid major data breaches.
Here's 15 of TitanHQ's Top free resources for system administrators, network admins and managed service providers
TitanHQ are in the process of deploying new and vastly improved ArcTitan systems in the EU and US. We will be migrating existing ArcTitan accounts to these systems.
In this article we examine recent research into how MSPs are adapting to COVID-19 and other challenges that so many companies are forced to deal with.
Phishing and social engineering attacks make much more work for MSPs who must detect, contain, and eradicate any malicious activity on a corporate network.
As Zoom and other communication software use increases, hackers find ways to exploit vulnerabilities. Vulnerable conferencing software is just one attack vector that is being used to eavesdrop on data.
On Thursday May 21st join us for an exclusive webinar 'Keeping your Remote Workers TWICE as secure with SpamTitan & WebTitan'. Learn how to protect remote workers from dangerous cyberattacks.
Recent attacks on the oil and gas industries use phishing and spear-phishing techniques. In many cases the attacks launch a dangerous Trojan called Agent Tesla.
Thousands of COVID-19 themed scam and malware sites are launched daily. This article highlights some of the most recent.
The FBI released a Private Industry Notification warning that Kwampirs malware is being used in supply chain cyberattacks on the healthcare industry.
A layer of security during DNS lookups, filters (usually cloud-based) can be added to identify common attack sites and stop browsers from loading malicious content.
Attackers operate by using well-known exploits to hack into vulnerable devices and make changes to the router's DNS configuration, changes that most users won't notice.
COVID-19-Themed email phishing attacks are increasing. Real-time AI driven threat intelligence is finding these new malicious threats as they surface.
During these uncertain times, Irish cybersecurity companies can offer innovative solutions to the challenge of managing a remote workforce.
It is now the job of internal IT to protect users during this time of remote working. They must protect remote workers from malware and phishing attacks during this time.
Remote workers need clear communication from IT on support and security issues. In the rush to provide remote access, don’t sacrifice cybersecurity.
Brexit related phishing campaigns are increasing as the Brexit deadline approaches. It’s common for cybercriminals to piggy-back on major political events to try and spread malware.
CAPTCHA phishing isn’t new. Attackers used it to trick users into installing malware disguised as an Adobe Flash update.
Every browser connection uses DNS to connect to the remote server, and encoding will not change the DNS query during a browser’s URL processing.
Recent phishing attacks have been taking advantage of users trust in popular sharing sites. These OAuth attacks are common in the wild and often use access verification messages.
With the onslaught in phishing, zero-day threats and malware attacks, basic security isn’t enough for SMBs. Today’s sophisticated threats need sophisticated defenses for a strong email security posture.
Consistency, scalability, flexibility and custom-tailored solutions for each client are key for running an effective, security-minded MSP.
BEC scams resulted in losses of over $1.2 billion in 2018 – more than twice the losses to BEC attacks reported in 2017. 2019 is likely to see losses increase further.
The Domain Name System (DNS) was established to make it easier to use the Internet. But DNS is a double-edged sword largely because of the insecure nature of the DNS...
Botnet attacks are responsible for the largest DDoS and command & control attacks on record. Criminals use botnets to flood legitimate networks with a crushing volume of traffic.
Many ransomware attacks start as phishing attacks which pivot into persistent infections. Breaches are bad for business, particularly if they are made public.
Cybercriminals disguise malware as pop-up notifications to update web browsers or software. The update notifications often look legitimate, such that unsuspecting users are unlikely to think twice before clicking “Install”.
Hackers will breach companies to confiscate data only to charge an extortion ransom to hide the breach rather than risk punitive GDPR fines.
Sign-up for email updates...