Blog

29 Results / Page 3 of 4

Gunpowder, Treason and Insider Threat!

today5 November 2018

  • 66
close

Blog Elizabeth Gladen

Gunpowder, Treason and Insider Threat!

Gunpowder, Treason and Insider Threat! This week many of us will be, at some point visiting a fireworks display with our families to celebrate what’s possibly the earliest example of a thwarted insider threat. Dating back over 400 years people have celebrated the foiled plans of 1604 to assassinate King ...

Malicious E-mail Prevention & Response

today24 October 2018

  • 209
close

Blog Elizabeth Gladen

Malicious E-mail Prevention & Response

Malicious E-mail Prevention & Response Millions of malicious e-mails are sent every day. Symantec reported that in 2016 1 in 131 e-mails sent contained malware. This figure dropped in 2017 down to 1 in 412 however according to Verizon’s 2017 Data Breach Investigations Report, two-thirds of all malware distributed was installed ...

Cyberseer – Detecting & Stopping a Remote Access Scam

today16 October 2018

  • 536
close

Blog Elizabeth Gladen

Detecting & Stopping a Remote Access Scam

Detecting & Stopping a Remote Access Scam Technical support and remote access scams aren’t exactly a new concept, they have been observed since as early as 2008. The premise is simple, the scammer cold calls the victim posing as a legitimate-sounding third-party, with a name such as “Microsoft” or “Windows Technical ...

The Facebook Hack Is The Proof We Need!

today2 October 2018

  • 53
close

Blog Elizabeth Gladen

The Facebook Hack Is The Proof We Need!

The Facebook Hack Is The Proof We Need! The Facebook Hack – The proof we need to embrace Machine Learning Threat Detection Tools for faster detection and response, by Cyberseer. Whilst the Wall Street Journal reports that Facebook could land a $1.63 billion dollar fine from the European Union under ...

Covert Channels – Detecting DNS Tunnelling

today8 April 2018

  • 1173
close

Blog Elizabeth Gladen

Covert Channels – Detecting DNS Tunnelling

Covert Channels – Detecting DNS Tunnelling Intro Domain Name System (DNS) is a fundamental protocol and naming system that enables computers, services or other applications connected to the internet or a private network that make use of domain names to work. It translates more readily memorised domain names into numerical ...

WannaCry Ransomware Stopped

today15 May 2017

  • 137
close

Blog Elizabeth Gladen

WannaCry Ransomware Stopped

WannaCry Ransomware Stopped Today, Cyberseer Analysts saw WannaCry ransomware in several customer environments, including a leading insurance group. Instead of causing disruption, it had been stopped at the early stages. Our Analysts discovered the suspicious domain activity whilst using machine learning technology Darktrace. Wana_Decrypt0r_screenshot.png  Cyberseers managed services is powered by machine ...

Security in the Cloud

today22 April 2017

  • 69
close

Blog Elizabeth Gladen

Security in the Cloud

Security in the Cloud The Raconteur Cloud for Business supplement (published by The Sunday Times) categorises the top cloud concerns of IT departments worldwide in its infographic “trust and security in the cloud.” It’s clear that the benefits of cloud adoption are significant in enabling business transformations, innovations and operational ...

Routine of a Website Malware Attack

today14 March 2017

  • 324
close

Blog Elizabeth Gladen

Routine of a Website Malware Attack

Routine of a Website Malware Attack A website malware attack is proving to be a popular choice with criminals. Attackers increasingly exploit web servers, the websites they host, and the people who use them. Over the last few years there has been a steady growth in the number of website ...