Recent Cyber Attacks & News

Cyber-attacks can happen to any business and its not just large corporations that can suffer from data breaches. Small organizations are at an increased risk with limited resources as cyber attack can lead to data losses easily. However, the largest of corporations in the world have fallen prey to cyber attacks. Below you will find the most recent information about cyber security and attacks. This page will automatically update to ensure you can always see the most recent cyber attack information.

Bookmark this page

  • FBI recommends passphrases over password complexity
    Longer passwords, even consisting of simpler words or constructs, are better than short passwords with special characters.
    Source: ZDNet | security RSSPublished on 2020-02-21
  • Extension Brings Internet Explorer Menu Bar to Microsoft Edge
    A developer has created a new extension for Microsoft Edge that restores Internet Explorer's menu bar, which gives you options like File, Edit, View, History, Bookmarks, Window, and Help menu right below the address bar.
    Source: BleepingComputerPublished on 2020-02-21
  • Screen, screen, on the wall, how does Cisco IT teach Webex to all?
    Within Cisco, we naturally make extensive use of Cisco Webex for collaboration and we find all sorts of ways to engage our users and drive adoption. It’s really a planes, trains, and automobiles strategy. With employees in nearly 100 countries, using Webex is a great way to connect and communicate with colleagues. Webex Teams leverages asynchronous communication to allow all time zones to participate in the conversation and Webex Meetings gives everyone the opportunity to join an online meeting from anywhere, using any device. Cisco IT is one customer of cloud-based Cisco Webex services and we’ve got positive feedback from more than 100,000 users as the product weaves into the fabric of our work styles. When we controlled the release schedules for the on-premise solution, it worked well for our old waterfall method of delivery. But our appetite for new features grew and the risk tolerance expanded, so we consumed our collaboration services from the cloud to meet the demands of an agile and fast-moving business. This paradigm shift meant we also needed to rethink our user adoption programs. With cloud delivered services, the user experience changes a lot more quickly than for on-premise offerings. This has some great benefits because we can see visible progress in product development addressing things like security, trust, stability, and new usability features. However, the regular releases also mean we need to constantly top up our user’s education on these services and the way these changes can benefit their work styles. We broadcast on multiple channels to share updates. In many cases we actually target our collaboration screens to promote adoption and educate on changes to the service. Our Video Everywhere strategy means video endpoints are deployed in all office buildings. It just makes sense to use this real estate to reach our employees in our 500 offices globally. We’ve transformed some of our video endpoints into dynamic billboards while they’re not engaged for meetings. We altered our Webex Boards and room-based units to display messaging like quick guides to increase awareness and help our users stay up-to-date with new features or ways of working.   In this communal space, our Webex Board has a dual-purpose: supporting casual collaboration and running informal training and awareness sessions. It shows tips like:
  • How to control a Room device
  • How to join a meeting
  • How to view Meeting Participant We’ve run sessions sharing practical advice on how to make the most of Webex Teams, cloud-registered end points, and Webex Meetings. Cisco’s Customer Experience (CX) team delivered training with their User Solution Empowerment (USE) program at key offices across the world. CX User Solution Empowerment is something available to customers and partners of Cisco and we found that the simple guides and talks about how to use screen sharing and whiteboarding were particularly well received. Our Executive Admin community particularly enjoyed these trainings as they are gate keepers for many of the information flows in their offices. We also targeted power users of collaboration services because they serve as both
Source: Security – Cisco BlogPublished on 2020-02-21
  • This is your last chance, HP. There’s no turning back. You take blue poison pill, the story ends. You take the red Xerox pill, you stay in Wonderland
    Photocopier goliath hits back to PC giant's attempt to scupper takeover Xerox has shot back at HP's decision to adopt a shareholder rights plan – a poison pill designed to derail the photocopier titan's $36.5bn hostile takeover of the PC'n'printer slinger.…
    Source: The RegisterPublished on 2020-02-21
  • Threat Roundup for February 14 to February 21
    Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Feb 14 and Feb 21. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats. As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net. Read More Reference: TRU02212020  – This is a JSON file that includes the IOCs referenced in this post, as well as all hashes associated with the cluster. The list is limited to 25 hashes in this blog post. As always, please remember that all IOCs contained in this document are indicators, and that one single IOC does not indicate maliciousness. See the Read More link above for more details. The post Threat Roundup for February 14 to February 21 appeared first on Cisco Blogs.
    Source: Security – Cisco BlogPublished on 2020-02-21
  • SlickWraps Allegedly Hacked, Financial and Customer Info Exposed
    A security researcher has stated that they have allegedly hacked SlickWraps and after receiving no response to emails, publicly disclosed how they gained access to the site and the data that was exposed.
    Source: BleepingComputerPublished on 2020-02-21
  • SlickWraps Data Breach Exposes Financial and Customer Info
    A security researcher has stated that they have allegedly hacked SlickWraps and after receiving no response to emails, publicly disclosed how they gained access to the site and the data that was exposed.
    Source: BleepingComputerPublished on 2020-02-21
  • The Amazon Prime phishing attack that wasn’t…
    When we followed the phishing trail, we found ourselves at a web page we weren't expecting
    Source: Naked SecurityPublished on 2020-02-21
  • RSAC 2020: Editors’ Preview of Hottest Sessions, Speakers and Themes
    From data privacy to industrial IoT cybersecurity concerns, Threatpost editors discuss the top stories they expect to see at this year's RSA Conference, which kicks off next week in San Francisco.
    Source: ThreatpostPublished on 2020-02-21
  • Burning Man Tickets for $225? Yep, Too Good to Be True
    Scammers are posing as event organizers in a sophisticated fraud effort.
    Source: ThreatpostPublished on 2020-02-21
  • Why Trust Us

    For most organisations and companies these days, maintaining a high level of cyber security couldn’t be more important. Not only is it key to protect customers and users’ personal and financial information.

    Get a Quote

    Click below and we’ll send you a quote as soon as possible.

    quote-form-pattern
    • This field is for validation purposes and should be left unchanged.

    Contact Us

    Click below and we’ll send you a quote as soon as possible.

    quote-form-pattern
    • This field is for validation purposes and should be left unchanged.

    Step 1 of 4 - Let’s get started

    25%
    • Thanks for your interest in working with us. Please complete the details below and we’ll get back to you as soon as possible.
    Close ×
    price-popup-pattern
    Close ×
    price-popup-pattern
    Close ×

    Step 1 of 3

    33%
    • Cyber Essentials Basic Pass Guarantee - £750

      Your Details

    price-popup-pattern
    Close ×

    Step 1 of 3

    33%
    • Cyber Essentials Basic Pay Monthly - £79 pcm

      Your Details

    price-popup-pattern
    Close ×

    Step 1 of 2

    50%
    • Cyber Essentials Plus - Get a Quote

      Your Details

    price-popup-pattern
    Close ×

    Get In Touch

    • This field is for validation purposes and should be left unchanged.
    price-popup-pattern
    Close ×

    Get A Quote

    • This field is for validation purposes and should be left unchanged.
    price-popup-pattern
    Close ×
    price-popup-pattern

    Buy Cyber Essentials

    price-popup-pattern