December 16 2024
The 2024 Vulnerability Crisis – Managing Cybersecurity Threats
Learn how organizations can meet the onslaught of cybersecurity vulnerabilities, along with five of the most common vulnerabilities and successful management strategies. Find out why there’s a new vulnerability every 17 minutes.
November 25 2024
Top 5 Cyberattacks During Black Friday and Thanksgiving
Find out about the top five biggest cyberattacks for Black Friday and Thanksgiving, from data breaches and ransomware, to see the risks businesses experience during the holidays.
November 22 2024
Healthcare Ransomware Attacks: How to Prevent and Respond Effectively
Learn how to protect yourself from healthcare ransomware attacks. We discuss the main security weaknesses, suggest security steps, and offer possible means of protecting patient information.
October 29 2024
What Causes Victims to Pay in a Ransomware Attack? The Psychology
Learn the main reasons why victims of a ransomware attack are forced to pay, such as the need to avoid operational disruption or the deceptive methods used by attackers to establish confidence.
April 24 2019
Digital Privacy in an Online World
In our normal day to day lives we understand the value of privacy. Locking the door to our homes or closing the curtains to the outside world comes naturally. But as we live more of our lives online and become increasingly dependent on our mobile and IoT devices, why do we give so little thought to our digital privacy?
February 25 2019
Cryptojacking in the age of cryptocurrency mining
Whilst the future use and viability of Cryptocurrencies may still be up for debate, the influence Bitcoin (the most famous cryptocurrency) has had on the market is clear– with its valuation peaking at just shy of $20,000 in December 2017.
March 7 2018
Cryptocurrency Mining Protection
Cryptocurrency mining is the latest trend in hacking (also called Cryptojacking) where code is injected into web sites and is used to hijack the users’ CPU to mine cryptocurrency. This has been driven by a boom in the value of cryptocoins in general and is a way for hackers to make money.
February 20 2018
Fileless PowerShell Attacks
Fileless PowerShell attacks are now the preferred weapon of choice for cyberattacks because they provide a number of techniques around existing security. Not least of all, the ability to run directly in memory and remotely download payloads.
November 6 2017
Dark Web Protection
BlackFog recently introduced Dark Web protection to prevent data loss, activation and transfer of malware over the Dark Web. With an exponential increase in activity over the Dark Web over the last 12 months it is crucial that your devices are protected from this new threat. The Dark Web ransomware economy alone is growing by 2,500% annually.