Beyond the Bait: A Deep Dive into Phishing Prevention

In a perpetually evolving digital landscape, phishing has emerged as a dominant cybersecurity threat. As cybercriminals continually refine their tactics, no business, regardless of its size, is immune to the risks. Drawing from our in-depth Phishing Guide (free download below), we aim to provide you with a concise yet comprehensive overview of this menace and […]
AI-Driven Phishing Attacks: A Comprehensive Guide to Understanding & Protecting Against the Threat

The cyber threats we face today are becoming more sophisticated and challenging to combat. One such emerging threat is the use of Artificial Intelligence (AI) by criminals to orchestrate highly targeted and convincing phishing campaigns. These AI-powered attacks are not only more personalised but also adaptive, making them harder to detect and prevent. In this […]
Digital Piracy: Understanding the Threat of Cryptojacking

As we venture deeper into the digital era, cybersecurity remains an ever-evolving battleground. One escalating issue that demands our attention is cryptojacking. The recently released SonicWall Mid-Year Threat report for 2023, warns of a record surge in cryptojacking. In 2022, cryptojacking surpassed 100 million for the first time ever. In the first six months of […]
From Perimeter to Zero Trust: Evolving Cybersecurity in the Digital Age

From Perimeter to Zero Trust: Evolving Cybersecurity in the Digital Age Understanding Zero Trust Zero Trust Security is a model of cyber security that challenges traditional perimeter-based security practices. Unlike traditional approaches that assume trust within the network, Zero Trust operates under the principle of “never trust, always verify.” It demands continuous verification of every […]
Safeguarding Personal Information: A Guide for Employees

In today’s digital world, safeguarding personal and company information is not just important, it’s essential.
SOCIAL ENGINEERING: A Guide to Understanding the Attacks and How to Mitigate the Risks

Introduction The landscape of cybersecurity threats is continually evolving and has largely transcended the traditional methods of hacking and virus distribution. Today, social engineering attacks have emerged as one of the most insidious and effective means of attack, relying on manipulation and psychology instead of technical expertise. Modern IT systems are difficult to infiltrate from […]
Protecting Your Business from CEO and Invoice Fraud

Protecting your business from financial fraud has become more critical than ever before, with all to frequent reports of unsuspecting businesses falling victim to criminals. CEO fraud and invoice fraud are two common types of scams that have cost small firms in Ireland millions of euros. The Banking and Payments Federation Ireland’s (BPFI) via FraudSMART […]
New BEC Campaign Uses AiTM Attacks to Steal Millions from Corporate Executives via Microsoft 365 Accounts

A recent Business Email Compromise (BEC) campaign has been identified that is using advanced spear-phishing techniques with Adversary-in-the-Middle (AiTM) attacks to target Microsoft 365 accounts belonging to corporate executives. The campaign, which researchers from Mitiga discovered during an incident response case, is now widespread and is targeting transactions worth several million dollars each. The phishing […]
Pig Butchering Scams – What are they and how to avoid them

From business email compromises to romance scams, criminals are raking in billions by using one powerful tool: social engineering. They lure their victims into making mistakes that could cost them everything – whether it’s trusting someone they shouldn’t or sending their hard-earned money into a black hole. But just when we thought we’d seen it […]
Email Remains The Number One Threat Vector

Attention all businesses: Are you aware of the dangerous threat lurking in your employees’ inboxes? Back in 2018 we warned that the greatest threat to your organisation Is sitting in the inboxes of your employees. Despite advancements in cyber defence, this is still the case and it’s becoming easier for bad actors to target your […]