Blog

17 Results / Page 1 of 2

people wearing blue tops standing in front of multiple colours

today09/02/2020

  • 79
  • 1
close

Blog Douglas Mulvihill

De stress your security staff with an advanced SOC?

9th February De stress your security staff with an advanced SOC? Discover how Cyberseer deal with increased data volumes and alerts. Many factors affect the ability for and organisation to remain secure, including an exponential increase in log data due to the adoption of cloud operating models, endpoint monitoring and ...

people standing in an office

today07/05/2019

  • 207
Featuredstar
close

Blog Elizabeth Gladen

8 Reasons for Detecting & Investigating Security Incidents with a Managed Security Provider (MSSP)

8 Reasons for Detecting & Investigating Security Incidents with a Managed Security Provider (MSSP) MSSPs can empower your security operations with the people, processes and technology required to take control and reduce dwell time to a minimum for your organisation. The threat landscape is continually evolving affecting all types of ...

Cyberseer Blog - Detecting Emotet Malspam Campaign

today07/03/2019

  • 375
Featuredstar
close

Blog Elizabeth Gladen

Blog – Detecting Emotet Malspam

Introduction to Emotet Malspam Recently, one of Cyberseer’s clients was hit with a “Malspam” campaign aiming to plant the Emotet malware within its network. The original e-mail was sent to a distribution group which quickly escalated the situation. As this was a new campaign for that day, the client’s e-mail ...

Cyberseer Blog Insider Data Theft

today28/02/2019

  • 35
  • 2
Featuredstar
close

Blog Elizabeth Gladen

Blog – Insider Data Theft

After a quick browse of cybersecurity headlines, any reader would quickly see the sheer volume of new and evolving threats an organisation may face. Often the biggest threats originate from outside an organisation. However, inside threats should be treated with just as much urgency. Whether you are a large, medium ...

Blog Wannacry Ransomware Threat Continues 21 Months Later from initial outbreak

today13/02/2019

  • 47
Featuredstar
close

Blog Elizabeth Gladen

Blog – Wannacry 21 months later

21 months after Wannacry’s initial discovery, a recent report from Kaspersky Labs has revealed that the WannaCry ransomware is still the most prevalent “crypter” with close to 75,000 users being infected as of Q3 2018, more than double that of its closest rival [1]. More worrying however is that between ...

Blog a day in the life of a cyber security analyst at Cyberseer

today17/01/2019

  • 218
  • 1
Featuredstar
close

Blog Elizabeth Gladen

Blog – A day in the life a Cyber Security Analyst

Regardless of the specific role of a professional working in cyber security, the day that lies ahead is unlikely to follow a generic 9 to 5 pattern. The unpredictable nature of the ever-evolving threat landscape can mean everything is quiet until it is not. Even before arriving into the office, ...

Cyberseer Blog Gunpowder Treason and Insider Threat!

today05/11/2018

  • 12
close

Blog Elizabeth Gladen

Gunpowder, Treason and Insider Threat!

This week many of us will be, at some point visiting a fireworks display with our families to celebrate what’s possibly the earliest example of a thwarted insider threat. Dating back over 400 years people have celebrated the foiled plans of 1604 to assassinate King James I. Whilst, not the ...

Cyberseer Blog Malcious Email Prevention and Response

today24/10/2018

  • 57
close

Blog Elizabeth Gladen

Malicious E-mail Prevention & Response

Millions of malicious e-mails are sent every day. Symantec reported that in 2016 1 in 131 e-mails sent contained malware. This figure dropped in 2017 down to 1 in 412 however according to Verizon’s 2017 Data Breach Investigations Report, two-thirds of all malware distributed was installed via malicious e-mail attachments. 60% of ...

Cyberseer Blog Detecting and Stoping a Remote Access Scam

today16/10/2018

  • 123
close

Blog Elizabeth Gladen

Cyberseer – Detecting & Stopping a Remote Access Scam

Technical support and remote access scams aren’t exactly a new concept, they have been observed since as early as 2008. The premise is simple, the scammer cold calls the victim posing as a legitimate-sounding third-party, with a name such as “Microsoft” or “Windows Technical Support” and offers to resolve issues such ...