Blog

30 Results / Page 3 of 4

Employee Data Theft

today28 February 2019

  • 320
  • 2
Featuredstar
close

Blog Elizabeth Gladen

Employee Data Theft

Employee Data Theft After a quick browse of cybersecurity headlines, any reader would quickly see the sheer volume of new and evolving threats an organisation may face. Often the biggest threats originate from outside an organisation. However, inside threats such as employee data theft should be treated with just as ...

WannaCry continues 21 months later

today13 February 2019

  • 376
Featuredstar
close

Blog Elizabeth Gladen

WannaCry continues 21 months later

WannaCry continues 21 months later 21 months after WannaCry’s initial discovery, a recent report from Kaspersky Labs has revealed that the WannaCry ransomware is still the most prevalent “crypter” with close to 75,000 users being infected as of Q3 2018, more than double that of its closest rival [1]. More ...

A day in the life a Cyber Security Analyst

today17 January 2019

  • 1346
  • 1
Featuredstar
close

Blog Elizabeth Gladen

A day in the life a Cyber Security Analyst

A day in the life a Cyber Security Analyst Regardless of the specific role of a professional working in cyber security, the day that lies ahead is unlikely to follow a generic 9 to 5 pattern. The unpredictable nature of the ever-evolving threat landscape can mean everything is quiet until ...

Gunpowder, Treason and Insider Threat!

today5 November 2018

  • 217
close

Blog Elizabeth Gladen

Gunpowder, Treason and Insider Threat!

Gunpowder, Treason and Insider Threat! This week many of us will be, at some point visiting a fireworks display with our families to celebrate what’s possibly the earliest example of a thwarted insider threat. Dating back over 400 years people have celebrated the foiled plans of 1604 to assassinate King ...

Malicious E-mail Prevention & Response

today24 October 2018

  • 461
close

Blog Elizabeth Gladen

Malicious E-mail Prevention & Response

Malicious E-mail Prevention & Response Millions of malicious e-mails are sent every day. Symantec reported that in 2016 1 in 131 e-mails sent contained malware. This figure dropped in 2017 down to 1 in 412 however according to Verizon’s 2017 Data Breach Investigations Report, two-thirds of all malware distributed was installed ...

The Facebook Hack Is The Proof We Need!

today2 October 2018

  • 149
close

Blog Elizabeth Gladen

The Facebook Hack Is The Proof We Need!

The Facebook Hack Is The Proof We Need! The Facebook Hack – The proof we need to embrace Machine Learning Threat Detection Tools for faster detection and response, by Cyberseer. Whilst the Wall Street Journal reports that Facebook could land a $1.63 billion dollar fine from the European Union under ...

Covert Channels – Detecting DNS Tunnelling

today8 April 2018

  • 1837
close

Blog Elizabeth Gladen

Covert Channels – Detecting DNS Tunnelling

Covert Channels – Detecting DNS Tunnelling Intro Domain Name System (DNS) is a fundamental protocol and naming system that enables computers, services or other applications connected to the internet or a private network that make use of domain names to work. It translates more readily memorised domain names into numerical ...

WannaCry Ransomware Stopped

today15 May 2017

  • 282
close

Blog Elizabeth Gladen

WannaCry Ransomware Stopped

WannaCry Ransomware Stopped Today, Cyberseer Analysts saw WannaCry ransomware in several customer environments, including a leading insurance group. Instead of causing disruption, it had been stopped at the early stages. Our Analysts discovered the suspicious domain activity whilst using machine learning technology Darktrace. Wana_Decrypt0r_screenshot.png  Cyberseers managed services is powered by machine ...

Security in the Cloud

today22 April 2017

  • 185
close

Blog Elizabeth Gladen

Security in the Cloud

Security in the Cloud The Raconteur Cloud for Business supplement (published by The Sunday Times) categorises the top cloud concerns of IT departments worldwide in its infographic “trust and security in the cloud.” It’s clear that the benefits of cloud adoption are significant in enabling business transformations, innovations and operational ...