The Benefits of a Simulated Phishing Exercise
There are many arguments about the pros and cons of conducting a simulated phishing exercise within an organisation, with many arguing that they add very…
There are many arguments about the pros and cons of conducting a simulated phishing exercise within an organisation, with many arguing that they add very…
Affected Systems: FortiOS versions 7.2.1, 7.2.0, 7.0.6, 7.0.5, 7.0.4, 7.0.3, 7.0.2, 7.0.1, and 7.0.0 FortiProxy versions 7.2.0, 7.0.6, 7.0.5, 7.0.4, 7.0.3, 7.0.2, 7.0.1, and 7.0.0…
Intelligence received at the Scottish Business Resilience Centre is warning of a current and active banking trojan campaign seen in the UK and around the…
If you’ve ever had an account on a website affected by a data breach, then chances are your credentials may be used in credential-stuffing attacks….
Affected Systems: Microsoft Exchange Server 2013, Exchange Server 2016, and Exchange Server 2019 Description: Researchers at cybersecurity firm GTSC have discovered two new zero-day vulnerabilities affecting Microsoft Exchange Server 2013, 2016,…
A new IT security training workshop launched today will give organisations the tools to protect themselves against the reputational risk associated with data leaks. The…
Description: Ukraine’s Ministry of Defence has warned of Russian plans to conduct mass cyber attacks on critical infrastructure belonging to Ukraine and its allies. The article details…
Multi-Factor authentication provider Okta has identified a considerable increase in credential stuffing attacks on their users in their 2022 State of Secure Identity Report. In the first 90…
Description: Cyber security firm Proofpoint has identified a phishing campaign that uses the death of Queen Elizabeth II as a lure. Their threat insight team revealed that threat actors had created…