Threat news
A selection of our blogs alerting information security professionals to new and emerging threats.
-
No Filter – Part One
Read moreSpear phishing exposes the ‘mobile gap’ in enterprise defenses. Spear phishing is one of the most effective, widely deployed, and…
-
Stealing secrets – the menace of mobile RAT’s
Read moreSmartphones infected with Remote Access Trojans are a critical risk for enterprise security Remote Access Trojans (RATs) have plagued Android…
-
MFA Bypass – Stealing Cookies
Read moreHow Adversary-in-the-Middle attacks undermine multi-factor authentication According to Verizon’s authoritative Data Breach Investigation Report, 90% of data breaches start by…
-
Pegasus, Predator, Hermit Spyware – NSO and its clones
Read moreRise in known exploits point to the proliferation of sophisticated cyber-surveillance tools targeting iOS and Android devices. The recent revelation…
-
Uncovering a sophisticated QR code phishing attack
Read moreA Case Study on Enhanced Security Measures In a recent cybersecurity incident a sophisticated phishing attack was unveiled, employing QR…
-
QR Codes – Sidestepping cyberdefenses
Read moreScan with Caution In the digital age, our defences against phishing have traditionally focused on the familiar: URL scanning, email…