Post date: 21/09/2021 - 10:45

First revealing themselves in 2018, Spectre-style attacks have been quietly exploiting security flaws in Chromium-based browsers (Google Chrome, Microsoft Edge, and Brave) to gain access to private and confidential information. Much like its counterpart, Meltdown, the Spectre vulnerability utilises a flaw in CPU optimization to breach security mechanisms and access a devices memory space - allowing hackers to obtain information all over the internet.

Post date: 15/09/2021 - 16:48
‘’Security teams face too many alerts, too many tools, and too many missed attacks; today’s siloed security solutions can’t keep up with evolving threats. Even when security teams deploy dozens of tools, they still lack the enterprise-wide visibility and deep analytics they need to stop attacks.’’ – PaloAlto

Post date: 15/09/2021 - 16:41
With the increase in cybercrime, it’s unfair to expect cyber security specialists to operate alone in mitigating them. Artificial intelligence is the perfect solution to the growth not only in the frequency of cyber-attacks, but also their proficiency in disarming networks and stealing data.

Post date: 15/09/2021 - 16:27
Machine learning describes the use and development of computerised systems that can adapt without following explicit instructions or code. These machines typically learn from algorithms and user data to conclude data patterns and can be combined with deep learning and artificial intelligence to create automated solutions to data management and distribution.

Post date: 15/09/2021 - 16:22
Deep learning describes a form of machine learning and artificial intelligence that utilises neural networks to imitate the way a human brain would learn data using complex abstraction and hierarchy.

Post date: 15/09/2021 - 16:20
Although there is much debate over what constitutes ‘true’ artificial intelligence, the concept features a combination of machine and deep learning to allow a machine to perform tasks previously actioned by humans, providing custom outputs dependant on the data it receives. Beyond this, the definition of artificial intelligence becomes somewhat more existential.
Post date: 14/09/2021 - 09:51
Between clients, customers, and leads, digital marketers hold a significant amount of desirable data that cyber criminals would be thrilled to get their hands on.

The digital marketing industry is valued at £220bn, with a projected growth to £581bn by 2026, making them a prime target for aspiring and seasoned ransomware artists due to their consistent usage of third-party tools and solutions creating more opportunities for a breach with the constant migration through various databases.

Post date: 14/09/2021 - 09:46
A botnet known as Mēris has targeted Yandex’s network with a record-breaking 21.8 million requests per second (RPS), overshadowing a recent high volume DDoS attack in the financial sector which reached 17.2 million RPS.

Post date: 13/09/2021 - 10:42
Zero-day is a term used to describe a cyber vulnerability previously unknown to those who would be involved in its mitigation, where a patch or solution has not yet been identified. Zero-Day attacks and vulnerabilities can vary in severity, but until the problem is resolved hackers can exploit it for personal gain until a solution has been implemented.

Why Zero-day?

Post date: 09/09/2021 - 09:04
On the 7th of September Microsoft warned of an actively exploited zero-day flaw, with significant repercussions to a limited number of Windows and Office users. The breach allowed hackers to hijack vulnerable windows systems using malware-infected Office documents.

Pages