Community Blog Apr 25Community BlogCOMMUNITY BLOG - Craig Ford - The road less travelledThe community blog posts are written by InfoSec professionals from diverse sectors who have kindly provided articles for free to support...
Demystify CyberApr 18Cybersecurity termsCybersecurity terms - exploitIn computing terms an exploit is when.a criminal takes advantage of a vulnerability or flaw in software applications to install malicious...
Demystify CyberApr 11Cybersecurity termsCybersecurity terms - zero trustZero Trust is a type of cybersecurity framework created by former Forrester employee John Kindervag in 2009. The concept holds that...
Demystify CyberApr 3Cybersecurity termsCybersecurity terms - Email gatewayAn email gateway is a security mechanism that monitors incoming and outgoing email traffic and analyses the emails with a pre-defined set...
Demystify CyberMar 23Cybersecurity termsCybersecurity terms - Credential stuffingCredential stuffing is when a criminal uses credentials that have been leaked via previous data breaches to attempt to access other...
Demystify CyberMar 20Cybersecurity termsCybersecurity terms - DDoSA distributed denial-of-service (DDoS) attack is a type of cybercrime campaign that aims to inundate a computer system with multiple...
Demystify CyberMar 13Fact SheetsFact Sheet - HTTPS The Hypertest Transfer Protocol (HTTP) is a set of communication rules that transfers information across the internet. For example, your...
Demystify CyberMar 6Fact SheetsFact Sheet - ransomwareRansomware is a type of malware that is designed to deny you access to your computer and files by either locking or encrypting them. The...
Demystify CyberFeb 27Fact SheetsFact Sheet - malware persistenceWhen a criminal has taken all that effort to install malware on your computer or network they want it to stay there undetected and active...
A TurnerFeb 13Community BlogCOMMUNITY BLOG - Vaishnavi Shimpi - let's stop phishing!The community blog posts are written by InfoSec professionals from diverse sectors who have kindly provided articles for free to support...
Demystify CyberFeb 13Fact SheetsFact Sheet - 5 ways to keep your social media account secureIt can be really hard to get your social media accounts back after they have been compromised, so let's look at ways to keep them safer....
Demystify CyberFeb 6Cybersecurity termsCybersecurity terms - Vulnerabilities and PatchingSoftware and technology evolve fast, and at times they may have an inadvertent flaw in them. Vulnerabilities in technology or software...
Demystify CyberJan 31Cybersecurity termsCybersecurity terms - APTAn Advanced Persistent Threat (APT) is usually a nation-state sponsored cybercrime group that aims to stealthily remain in a computer...
Community Blog Jan 25Community BlogCOMMUNITY BLOG - James Meikle - BBQing Risks Steakments (Statements)The community blog posts are written by InfoSec professionals from diverse sectors who have kindly provided articles for free to support...
Demystify CyberJan 23Fact SheetsFact Sheet - Business Email CompromiseBusiness Email Compromises (BEC) are a type of email based fraud where a criminal sends an email, impersonating a business’ CEO/...
Demystify CyberJan 13Malware IntelAgent Tesla Demystify Cyber analysed the payload from a malicious email campaign from 9 January 2022 that contains an attachment called Purchase...
Demystify CyberJan 10Fact SheetsFact Sheet - Remote access scamsRemote access scams are types of fraud that include faked technical support and faked refunds. The criminals aim to convince their...
Demystify CyberJan 7Fact SheetsFact Sheet - NFTDISCLAIMER - The information on this page is not intended as financial or investment advice. The Demystify Cyber team are interested in...
Demystify CyberJan 4Fact SheetsFact Sheet - 'sextortion' emailsCyber criminals are using increasingly sophisticated methods to exploit individuals and businesses to obtain sensitive information and...
Demystify CyberJan 3Cybersecurity termsCybersecurity terms - XSSCross site scripting (XSS) is where malicious code is injected into legitimate, but vulnerable, websites to deliver malware to the...