The Zero-day Threat – What can you do about it?
In the first part of this series looking at the Zero-day threat we defined what the threat was and how … Read more
In the first part of this series looking at the Zero-day threat we defined what the threat was and how … Read more
This is part two of my piece on extortion ransomware. The first part is here – you should read it … Read more
What is extortion ransomware? We are all familiar with the ransomware model – encryption malware corrupts your files and demands … Read more
My Ransomware Mini-series came to an end this, with the tenth part being published here on CyberAwake looking at what … Read more
Ransomware – It’s gone What spoilt your Monday morning – ransomware on the network – has now been cleaned out. … Read more
It is an odd title, but as I bring this ransomware mini-series to a close I want to go back … Read more
The Impact of Ransomware So the worst has happened. You come into work on a Monday morning early, to get … Read more
Credential stuffing cyber attacks depend on one crucial mistake by the user – they just need to use the same … Read more
Why do hackers do what they do? It is impossible to determine exactly why a threat actor hacks a system … Read more
Working from Anywhere and Business Email Compromise If you are looking for something lighter because it is Christmas, can I … Read more