Icon 1.png

DEMYSTIFY CYBER

  • Home

  • Services

    • Demystify
    • Enable
    • Empower
  • Resources

  • Partners

  • About

  • More

    Use tab to navigate through the menu items.
    Contact

    RESOURCES

    All Posts
    Malware Intel
    Fact Sheets
    Community Blog
    Cybersecurity Terms
    COMMUNITY BLOG - Craig Ford - The road less travelled
    Community Blog
    • Apr 25
    Community Blog

    COMMUNITY BLOG - Craig Ford - The road less travelled

    The community blog posts are written by InfoSec professionals from diverse sectors who have kindly provided articles for free to support...
    20
    Cybersecurity terms - exploit
    Demystify Cyber
    • Apr 18
    Cybersecurity terms

    Cybersecurity terms - exploit

    In computing terms an exploit is when.a criminal takes advantage of a vulnerability or flaw in software applications to install malicious...
    00
    Cybersecurity terms - zero trust
    Demystify Cyber
    • Apr 11
    Cybersecurity terms

    Cybersecurity terms - zero trust

    Zero Trust is a type of cybersecurity framework created by former Forrester employee John Kindervag in 2009. The concept holds that...
    20
    Cybersecurity terms - Email gateway
    Demystify Cyber
    • Apr 3
    Cybersecurity terms

    Cybersecurity terms - Email gateway

    An email gateway is a security mechanism that monitors incoming and outgoing email traffic and analyses the emails with a pre-defined set...
    00
    Cybersecurity terms - Credential stuffing
    Demystify Cyber
    • Mar 23
    Cybersecurity terms

    Cybersecurity terms - Credential stuffing

    Credential stuffing is when a criminal uses credentials that have been leaked via previous data breaches to attempt to access other...
    80
    Cybersecurity terms - DDoS
    Demystify Cyber
    • Mar 20
    Cybersecurity terms

    Cybersecurity terms - DDoS

    A distributed denial-of-service (DDoS) attack is a type of cybercrime campaign that aims to inundate a computer system with multiple...
    80
    Fact Sheet - HTTPS
    Demystify Cyber
    • Mar 13
    Fact Sheets

    Fact Sheet - HTTPS

    The Hypertest Transfer Protocol (HTTP) is a set of communication rules that transfers information across the internet. For example, your...
    80
    Fact Sheet - ransomware
    Demystify Cyber
    • Mar 6
    Fact Sheets

    Fact Sheet - ransomware

    Ransomware is a type of malware that is designed to deny you access to your computer and files by either locking or encrypting them. The...
    80
    Fact Sheet - malware persistence
    Demystify Cyber
    • Feb 27
    Fact Sheets

    Fact Sheet - malware persistence

    When a criminal has taken all that effort to install malware on your computer or network they want it to stay there undetected and active...
    70
    COMMUNITY BLOG - Vaishnavi Shimpi - let's stop phishing!
    A Turner
    • Feb 13
    Community Blog

    COMMUNITY BLOG - Vaishnavi Shimpi - let's stop phishing!

    The community blog posts are written by InfoSec professionals from diverse sectors who have kindly provided articles for free to support...
    00
    Fact Sheet - 5 ways to keep your social media account secure
    Demystify Cyber
    • Feb 13
    Fact Sheets

    Fact Sheet - 5 ways to keep your social media account secure

    It can be really hard to get your social media accounts back after they have been compromised, so let's look at ways to keep them safer....
    340
    Demystify Cyber
    • Feb 6
    Cybersecurity terms

    Cybersecurity terms - Vulnerabilities and Patching

    Software and technology evolve fast, and at times they may have an inadvertent flaw in them. Vulnerabilities in technology or software...
    60
    Demystify Cyber
    • Jan 31
    Cybersecurity terms

    Cybersecurity terms - APT

    An Advanced Persistent Threat (APT) is usually a nation-state sponsored cybercrime group that aims to stealthily remain in a computer...
    330
    COMMUNITY BLOG - James Meikle - BBQing Risks Steakments (Statements)
    Community Blog
    • Jan 25
    Community Blog

    COMMUNITY BLOG - James Meikle - BBQing Risks Steakments (Statements)

    The community blog posts are written by InfoSec professionals from diverse sectors who have kindly provided articles for free to support...
    310
    Demystify Cyber
    • Jan 23
    Fact Sheets

    Fact Sheet - Business Email Compromise

    Business Email Compromises (BEC) are a type of email based fraud where a criminal sends an email, impersonating a business’ CEO/...
    410
    Demystify Cyber
    • Jan 13
    Malware Intel

    Agent Tesla

    Demystify Cyber analysed the payload from a malicious email campaign from 9 January 2022 that contains an attachment called Purchase...
    750
    Demystify Cyber
    • Jan 10
    Fact Sheets

    Fact Sheet - Remote access scams

    Remote access scams are types of fraud that include faked technical support and faked refunds. The criminals aim to convince their...
    460
    Fact Sheet - NFT
    Demystify Cyber
    • Jan 7
    Fact Sheets

    Fact Sheet - NFT

    DISCLAIMER - The information on this page is not intended as financial or investment advice. The Demystify Cyber team are interested in...
    470
    Demystify Cyber
    • Jan 4
    Fact Sheets

    Fact Sheet - 'sextortion' emails

    Cyber criminals are using increasingly sophisticated methods to exploit individuals and businesses to obtain sensitive information and...
    1230
    Demystify Cyber
    • Jan 3
    Cybersecurity terms

    Cybersecurity terms - XSS

    Cross site scripting (XSS) is where malicious code is injected into legitimate, but vulnerable, websites to deliver malware to the...
    480
    1
    23
    • Twitter
    • LinkedIn

    ©2022 Demystify Cyber