Been hacked? Call us now

Insights

This is where we share our expertise, thoughts and advice.

Everything you need to know about malware

In 2023, 6.06 billion malware attacks were detected globally. The most commonly blocked types of malware were worms, viruses, ransomware, and trojans. Phishing attacks, primarily delivered through e-mail and websites, continue to incur significant costs for both individuals and enterprises.
Learn everything you need to know about malware in this article.

Why you should run pen tests no matter your organization size

Every company, no matter its size, has digital assets, tools, and resources that need protection.

Developing a cybersecurity plan, implementing protective measures, and documenting procedures are essential steps for safeguarding assets. However, only the penetration test provides a concrete assessment of vulnerabilities and immediate insights into cyber risks and threats.
Learn why you should run pen tests no matter your organization size :

Latest Updates on CMMC

The recent amendment to 48 CFR, dated August 14th, 2024, offers clarity on the timeline and implementation of Cybersecurity Maturity Model Certification (CMMC) requirements within defence contracts.
The rollout will proceed over a three-year phased approach.

This rule, expected to be in force June 2025 will insert CMMC requirements into DoD contracts.

AI Copilot - Cyber Security - LLM

New threats on AI-based chatbots: the RCE attacks

AI tools have revolutionized the way organizations work, significantly enhancing efficiency and productivity. Companies increasingly implement tools like Microsoft Copilot into their daily operations, assisting employees by organizing tasks, processing large quantities of data, and helping streamline operations. While AI tools are widely adopted by enterprises, they are also catching the attention of cybercriminals. A new cyber threat has emerged: Remote “Copilot” Execution (RCE) attacks, as demonstrated at Black Hat USA 2024.

Why regular backup is crucial in cybersecurity strategy

Regularly securing your data is your most reliable ally. With regular backups, your data will remain secure, intact, and ready to be restored in the event of a successful attack. This is your continuity plan against ransomware attacks that seek to compromise your organization’s access to its critical data.

The latest trends in cybersecurity: AI, an asset or a risk?

Many organizations have adopted AI to enhance their services, searches and code, and this trend is set to continue. However, AI adoption comes with its own risks and cybercriminals are utilizing AI capabilities to aid them in their attacks. What will AI mean for organizations in the future? Is it an asset or a risk to your organization?

Crowdstrike: Microsoft launches tool to save crashed Windows PCs

Since Friday 19 July 2024, and the release of the CrowdStrike update causing a big mess on a global scale, many companies are looking for help. Cybercriminals have understood this well: they have implemented several malicious campaigns. Learn how the problem can be corrected.

Global Microsoft/Crowdstrike IT Outage Cripples Many Businesses

The Crowdstrike outage is historical. Millions of workstations are crashing, around the world. Around 70% of Fortune 100 companies are affected.

The global outage grounded flights and knocked banks, hospital systems and media outlets offline.

We can provide immediate support to address any current vulnerabilities and work towards a swift recovery for your affected systems.

Blast-RADIUS attack threatening enterprise networks

A new vulnerability has been found: the Blast RADIUS attack. This attack represents a danger to the Remote Authentication Dial-In User Service (RADIUS) protocol, an essential network authentication component. This vulnerability may allow adversaries to take control of enterprise networks, telecommunications services, industrial controls, and ISPs.

A new ransomware promises to be El Dorado for cybercriminals

The new Eldorado ransomware targets Windows and VMware ESXi systems, with sixteen victims primarily in the United States across various industries. Groupe-IB researchers observed Eldorado’s activities and announced the threat on RAMP forums. This ransomware uses the ChaCha20 algorithm for encryption and generates unique keys for each locked file.
How can you protect against ransomware? Learn more in the article.