Cyber Security in 2024: Key Forecasts and Insights for the Year Ahead

Cyber Security in 2024: Key Forecasts and Insights for the Year Ahead

As 2024 unfolds, the cyber security landscape is rapidly evolving. Understanding the key trends shaping this dynamic field is essential to keep pace with emerging threats and challenges. In late 2023, leading industry vendors released their predictions and forecasts for the coming year. For this post I decided to test the capabilities of ChatGPT plus … Continue reading Cyber Security in 2024: Key Forecasts and Insights for the Year Ahead

The 12 Scams of Christmas 2023

The 12 Scams of Christmas 2023

As the festive season approaches, we encourage you to channel your inner Scrooge – not in stinginess, but in fiercely protecting your data and your hard-earned money from criminals.  Last year, An Garda Síochána issued a warning to consumers, stating that online fraud was on the rise at Christmas time.  This year, our message is … Continue reading The 12 Scams of Christmas 2023

Beyond the Bait: A Deep Dive into Phishing Prevention

Beyond the Bait: A Deep Dive into Phishing Prevention

In a perpetually evolving digital landscape, phishing has emerged as a dominant cybersecurity threat. As cybercriminals continually refine their tactics, no business, regardless of its size, is immune to the risks. Drawing from our in-depth Phishing Guide (free download below), we aim to provide you with a concise yet comprehensive overview of this menace and […]

Digital Piracy: Understanding the Threat of Cryptojacking

Digital Piracy: Understanding the Threat of Cryptojacking

As we venture deeper into the digital era, cybersecurity remains an ever-evolving battleground. One escalating issue that demands our attention is cryptojacking. The recently released SonicWall Mid-Year Threat report for 2023, warns of a record surge in cryptojacking. In 2022, cryptojacking surpassed 100 million for the first time ever. In the first six months of […]

SOCIAL ENGINEERING: A Guide to Understanding the Attacks and How to Mitigate the Risks

SOCIAL ENGINEERING: A Guide to Understanding the Attacks and How to Mitigate the Risks

Introduction The landscape of cybersecurity threats is continually evolving and has largely transcended the traditional methods of hacking and virus distribution. Today, social engineering attacks have emerged as one of the most insidious and effective means of attack, relying on manipulation and psychology instead of technical expertise. Modern IT systems are difficult to infiltrate from […]

Protecting Your Business from CEO and Invoice Fraud

Protecting Your Business from CEO and Invoice Fraud

Protecting your business from financial fraud has become more critical than ever before, with all to frequent reports of unsuspecting businesses falling victim to criminals. CEO fraud and invoice fraud are two common types of scams that have cost small firms in Ireland millions of euros. The Banking and Payments Federation Ireland’s (BPFI) via FraudSMART […]

New BEC Campaign Uses AiTM Attacks to Steal Millions from Corporate Executives via Microsoft 365 Accounts

New BEC Campaign Uses AiTM Attacks to Steal Millions from Corporate Executives via Microsoft 365 Accounts

A recent Business Email Compromise (BEC) campaign has been identified that is using advanced spear-phishing techniques with Adversary-in-the-Middle (AiTM) attacks to target Microsoft 365 accounts belonging to corporate executives. The campaign, which researchers from Mitiga discovered during an incident response case, is now widespread and is targeting transactions worth several million dollars each. The phishing […]