Infosecurity Blogs

Protecting Your Business as DDoS Attacks Set to Surge
From politically motivated efforts to ransom extortion, nobody is safe from getting hit by a DDoS attack.

ID Authentication Bypass and the Next Evolution in Phishing Campaigns
New insights highlight the sophistication of modern phishing packages available to budding fraudsters

The Increasingly Complex Threat Landscape Must Be Fought With Simplicity
New research shows that 65% of UK and US CI organizations have fallen victim to a cyber-attack

Interactive Malware Sandbox in Your Security System
Understand how to overcome the issues of traditional antiviruses with an online malware sandbox

Template Injection Attacks: Mitigating Modern Threats
The Menlo Labs Team has recently observed a spike in template injection attacks

An Analysis of Security Vulnerability Trends During COVID-19
What were the security vulnerability trends during COVID-19?

Why Zero Trust and Identity and Access Management are Essential to Enterprise Security
Discover why turning to Zero Trust is important to be able to secure an organization's operations

Combating CNI Security Concerns in a Complex Climate
An attack on critical infrastructure remains an ongoing concern for cybersecurity professionals and there is a need for best practices to be followed

Cross-Functional Collaboration is Becoming Essential for Security Professionals
The threats facing organizations today are too numerous and complex to be dealt with exclusively by the security team

Qakbot: Analysing a Modern-Day Banking Trojan
Attackers are using increasingly innovative methods to launch the Qakbot Trojan

Initial Access Brokers and Blocking the Continued March of Ransomware
IABs have made ransomware attacks easier for affiliate groups and organizations need to respond

Observing the Changing Nature of Security within Organizations
Understand why an organization's security posture must align with business objectives

Fixing Our Breaking Human Controls
Jenai Marinkovic argues that more empathy is required to mitigate cyber-threats

How to Solve Third-Party Remote Access Problems in Manufacturing
Under Industry 4.0 securing OT, ICS and PLC systems is more important than ever before

The Role of Cloud Services in the Hybrid War in Ukraine
Threat actors linked to the Russia-Ukraine war are increasingly seeking to exploit cloud services

Outsourcing Cyber Risk: Why an Integrated Approach is Critical
While many organisations are looking for a silver bullet to combat all threats, there is no such thing as a one-size-fits-all approach

Looking East: Japanese Credit Card Customers Targeted With Phishing Attacks
The threat actor was likely to have been of Chinese origin

The Challenge of Shadow OT
No matter how your ICS/OT environment is connected, it needs to be secured

Keeping up with the Attackers: Educating Staff on New Monkeypox Themed Phishing Campaigns
Threat actors exploit public wariness surrounding new medical concerns

How Russian Information Operations Are Trying to Win the War
A whole-of-community response is required to counter Russian attempts to undermine and divide the Western coalition

















