fbpx

IT threats

ATTACHMENT DETAILS DALL·E-2023-12-10-09.17.16-An-illustration-of-a-nuclear-reactor-pool-during-refueling-showcasing-an-array-of-cylindrical-fuel-assemblies-submerged-in-water-casting-a-blue-glow.

Most Hazardous Nuclear Site | Cyber-Attack

Ministers are under pressure to explain the actions of the government and regulators over cybersecurity at Europe’s most hazardous nuclear site after a Guardian investigation revealed disturbing vulnerabilities in its networks. The shadow energy secretary, Ed Miliband, called on the government to urgently “provide assurances” about Sellafield, after the Guardian revealed it had been hacked […]

Most Hazardous Nuclear Site | Cyber-Attack Read More »

Scarred Manticore Targets Middle East With Advanced Malware – Infosecurity Magazine

An ongoing Iranian espionage campaign led by Scarred Manticore, an actor associated with the Ministry of Intelligence and Security (MOIS), has been observed targeting high-profile organizations in the Middle East, particularly in the government, military and telecommunications sectors. Its targets also include IT service providers, financial organizations and non-governmental organizations (NGOs). Discovered by Check Point Research

Scarred Manticore Targets Middle East With Advanced Malware – Infosecurity Magazine Read More »

Do not be held for ransom. Invest in ActiveImage Ransomware Protector today!

MSPs: Are You Protected Against Ransomware in 2019?

Ransomware is a tool that cyber-criminals use to infiltrate computer servers, desktops, laptops and other mobile devices. This malicious software then encrypts a company’s critical files and web properties and holds them for ransom until the company or organisation pays the requested amount (usually through cryptocurrency), on which the cyber-criminal will release the company’s digital

MSPs: Are You Protected Against Ransomware in 2019? Read More »

What is a Blended Attack?

Blended attacks combine multiple threats into a single attack to leave a networked computer completely compromised. Normal cyber attacks tend to have only one attack vector, but blended attacks will use multi-pronged strikes to exploit any vulnerabilities. Security and IT personnel have a difficult time trying to deal with a blended attack as they hit

What is a Blended Attack? Read More »

2018’s Most Common Cyber Attacks

With the year drawing to a close and the holidays fast approaching, we take time to look back at the cyber attacks that dominated the world of cyber crime in 2018. By understanding the main tactics used by cyber criminals this year, we can predict and become more prepared for next year’s threats.   5

2018’s Most Common Cyber Attacks Read More »

3 Basics Ways to Protect Your Small Business From Phishing

Phishing uses social engineering techniques in an attempt to convince a user to give up their private information. They gain access to usernames, passwords, credit card number and other sensitive information. Cybercriminals will pose as a legitimate person or company. Email may include links to a real website. These websites, companies and individuals are fake

3 Basics Ways to Protect Your Small Business From Phishing Read More »

Scroll to Top