TLS Certificates in High Demand on the Dark Web

TLS Certificates in High Demand on the Dark Web

A recent study confirms that SSL/TLS certificates, both individually and packaged, are being sold on the dark web. TLS certificates, both individually and packaged with…

View More TLS Certificates in High Demand on the Dark Web
Aluminium plant Norsk Hyrdo hit by severe cyber attack

Aluminium plant Norsk Hyrdo hit by severe cyber attack

Norsk Hydro, one of the world’s largest aluminum producers, has been hit by a cyber attack that has knocked out IT systems in facilities across the globe.  The…

View More Aluminium plant Norsk Hyrdo hit by severe cyber attack
ISO 27001: The 14 control sets of Annex A explained

ISO 27001: The 14 control sets of Annex A explained

ISO 27001 is the international standard that describes best practice for an ISMS (information security management system). The Standard takes a risk-based approach to information…

View More ISO 27001: The 14 control sets of Annex A explained
Your money or your life: Digital extortion scams

Your money or your life: Digital extortion scams

There’s a particularly insidious type of targeted phishing scam that has grown in popularity since mid-2018. Our Cisco Talos researchers have been monitoring these scams,…

View More Your money or your life: Digital extortion scams
Penetration Testing: Breaking in to Keep Others Out

Penetration Testing: Breaking in to Keep Others Out

Penetration testing is a direct test of an application, a device, a website, an organization, and even the people that work at an organization. It…

View More Penetration Testing: Breaking in to Keep Others Out
The 11 biggest issues IT faces today

The 11 biggest issues IT faces today

Each year we talk with tech leaders about the biggest problems they’ll face in the near future, and we’re starting to see some subtle and…

View More The 11 biggest issues IT faces today
AI in Beer Brewing

AI in Beer Brewing

Artificial intelligence (in this case machine learning based AI) is making its way into so many parts of our lives without us even realising it.…

View More AI in Beer Brewing
Supply Chain Attacks Increase As Cybercriminals Focus On Exploiting Weak Links

Supply Chain Attacks Increase As Cybercriminals Focus On Exploiting Weak Links

Companies of all sizes and spanning all industries are aware of the security risks that are out there. They understand security best practices and invest…

View More Supply Chain Attacks Increase As Cybercriminals Focus On Exploiting Weak Links
These Are The Five Most Dangerous Email Attachments

These Are The Five Most Dangerous Email Attachments

Despite the existence of much more advanced attacks, cybercriminals still rely heavily on spam emails. They’re much more sophisticated today than they were in the…

View More These Are The Five Most Dangerous Email Attachments
Smartphone Hacks Hit Saudi Activists Via WhatsApp

‘Disturbing’ Smartphone Hacks Hit Saudi Activists Via WhatsApp

Israel’s NSO Group makes some of the most invasive, powerful spyware on the planet. If you’ve got an iPhone or an Android device, someone among…

View More ‘Disturbing’ Smartphone Hacks Hit Saudi Activists Via WhatsApp