Blogs

17 Results / Page 1 of 2

people wearing blue tops standing in front of multiple colours

today9 February 2020

  • 135
  • 1
close

Blogs Douglas Mulvihill

De stress your security staff with an advanced SOC?

De stress your security staff with an advanced SOC? Many factors affect the ability for and organisation to remain secure, including an exponential increase in log data due to the adoption of cloud operating models, endpoint monitoring and more reliance being placed on online applications. The need to ensure that ...

people standing in an office

today7 May 2019

  • 319
Featuredstar
close

Blogs Elizabeth Gladen

8 Reasons for Detecting & Investigating Security Incidents with a Managed Security Provider (MSSP)

8 Reasons for Detecting & Investigating Security Incidents with a Managed Security Provider (MSSP)​ The threat landscape is continually evolving affecting all types of business that embrace and rely on technology to continue their day to day operations. The explosion of cloud-based applications and services coupled with initiatives such as ...

Malware

today7 March 2019

  • 598
  • 1
Featuredstar
close

Blogs Elizabeth Gladen

Detecting Emotet Malspam

Detecting Emotet Malspam​ Introduction to Emotet Malspam Recently, one of Cyberseer’s customer’s was hit with a “Malspam” campaign aiming to plant the Emotet malware within its network.  The original e-mail was sent to a distribution group which quickly escalated the situation. As this was a new campaign for that day, ...

isider looking at your data

today28 February 2019

  • 72
  • 2
Featuredstar
close

Blogs Elizabeth Gladen

Insider Data Theft

Insider Data Theft After a quick browse of cybersecurity headlines, any reader would quickly see the sheer volume of new and evolving threats an organisation may face. Often the biggest threats originate from outside an organisation. However, inside threats should be treated with just as much urgency.  Whether you are ...

man crying like a baby

today13 February 2019

  • 79
Featuredstar
close

Blogs Elizabeth Gladen

WannaCry continues 21 months later

WannaCry continues 21 months later 21 months after WannaCry’s initial discovery, a recent report from Kaspersky Labs has revealed that the WannaCry ransomware is still the most prevalent “crypter” with close to 75,000 users being infected as of Q3 2018, more than double that of its closest rival [1]. More ...

forensic analyst working

today17 January 2019

  • 294
  • 1
Featuredstar
close

Blogs Elizabeth Gladen

A day in the life a Cyber Security Analyst

A day in the life a Cyber Security Analyst Regardless of the specific role of a professional working in cyber security, the day that lies ahead is unlikely to follow a generic 9 to 5 pattern. The unpredictable nature of the ever-evolving threat landscape can mean everything is quiet until ...

sparkler

today5 November 2018

  • 29
close

Blogs Elizabeth Gladen

Gunpowder, Treason and Insider Threat!

Gunpowder, Treason and Insider Threat! This week many of us will be, at some point visiting a fireworks display with our families to celebrate what’s possibly the earliest example of a thwarted insider threat. Dating back over 400 years people have celebrated the foiled plans of 1604 to assassinate King ...

today24 October 2018

  • 86
close

Blogs Elizabeth Gladen

Malicious E-mail Prevention & Response

Malicious E-mail Prevention & Response Millions of malicious e-mails are sent every day. Symantec reported that in 2016 1 in 131 e-mails sent contained malware. This figure dropped in 2017 down to 1 in 412 however according to Verizon’s 2017 Data Breach Investigations Report, two-thirds of all malware distributed was installed ...

today16 October 2018

  • 194
close

Blogs Elizabeth Gladen

Cyberseer – Detecting & Stopping a Remote Access Scam

Detecting & Stopping a Remote Access Scam Technical support and remote access scams aren’t exactly a new concept, they have been observed since as early as 2008. The premise is simple, the scammer cold calls the victim posing as a legitimate-sounding third-party, with a name such as “Microsoft” or “Windows Technical ...