
Credential stuffing: What is it and how to prevent it
Credential stuffing is a term that you often hear. Here we give you the information you need to understand what credential stuffing is, answer your FAQs and share what you can do to protect your business from credential stuffing attacks. What is credential stuffing & how does it work? Credential stuffing is a ‘brute force […]
Concerns about data harvesting
As a penetration tester, you know more about vulnerabilities, not just for companies but personally. You know how easy it is for cyber attackers to access and collect personal information, a process known as data harvesting. What is data harvesting? Data harvesting, also known as data mining or web scraping, is when companies collect your […]
Cyber Security Stats For The UK 2021
According to the 6th annual edition of the Cyber Security Breaches Survey 2021 highlighting the risks, frequency, and business attitudes towards cybersecurity in the UK, the majority of businesses say COVID-19 has made no change to the importance they place on cyber security. We have summarised the key takeaways from this report for your interest […]
Collection #1: The ‘largest’ data breach ever discovered
Over the years, many sizeable well-known household name companies have fallen victim to cyber attackers, including many large players that you may not have heard of. Here we look into what we believe to be the most significant data breach the world has experienced. So you may be wondering just who has fallen victim to […]
Cyber Security Incidents of 2020
Today we take a look at some of the most significant cybersecurity incidents of 2020, their impact, and the steps your organisation can take to protect itself. Cybersecurity in the UK According to ITpro.co.uk, 2020 was the busiest year on record for cyberattacks against UK firms, with a 20% rise against 2019 (exactly 686,961 according […]
The risks of insufficient logging and monitoring
Insufficient logging and monitoring is number ten on OWASP’s list of most critical web application and internet security risks. OWASP states that insufficient logging and monitoring is the bedrock of nearly every major incident. Attackers rely on insufficient logging, detection, monitoring, and response weaknesses to avoid detection. What is insufficient l
Category
Recent Post
Tags