Blogs

Blogs

What Is Credential Stuffing?

Credential stuffing relies primarily on the reuse of the same usernames or account IDs across different online services. It is one of the most common practices among cybercriminals. The hackers use previously acquired credentials from other 3rd party data breaches and run it against millions

Rising Concerns To Include Ransomware In Cyber Insurance?

According to BBC, The Association of British Insurers (ABI) has been accused of “funding” organized crime by including ransomware blackmail payments in cyber insurance policies. What Is The Argument Of Including Ransomware Payouts In Cyber Insurance Policies? Recently, Oxford University’s Prof. Ciaran Martin expressed his concerns

Thousands Of Spotify Account Hacked

Credential stuffing attack hits over 300,000 Spotify accounts With its increased popularity in 2008 (just 2 years after the launch), the audio streaming platform has been a cyberattack victim several times. A “credential stuffing” attack reportedly had hit Spotify in the summer of 2020. This

October: Cyber Security Awareness Month

As the coronavirus continues to make us work from home, the cybercriminals are getting laser-focused at finding their next target. These hackers are mainly focused on attacking small and medium-sized businesses because the hackers know that SMBs are focused on surviving in this challenging time.

Why are Small Businesses the New Targets for Cyberattacks?

Every time we mention cybersecurity to a small business owner or a senior executive, we often get a monotonous response – we are too small of a business for cyberattacks. But, according to a study by the security software company Symantec, 36 per cent of recent

How to Protect Your Customers and Business from CyberCrime

According to the Ponemon Institute’s 2017 State of Cybersecurity in Small & Medium-Sized Businesses report, the percentage of small businesses that have experienced a cyber-attack in the past 12 months has risen from 55% in 2016 to 61% in 2017. Another study saw a 20.5%

Ikea Has Fallen Victim To Another Cyber Attack Yet Again

One of Canada’s favourite furniture stores has fallen victim to an attack impacting over 95,000 Canadians. Today Ikea Canada has revealed  their customer portal has experienced a Data Breach that occurred back in March. Ironically, this is Ikea’s second attack in the last six months;

Just Because you have a backup

When faced with a ransomware attack the current wisdom is if your computer gets infected and it encrypts your files you have three basic options: Pay the ransom Restore from a backup Cut your losses and nuke the computer Of those three choices, backup is

Making Cyber Security A Priority

It is 2022, and every day even the smallest of businesses are coming to terms with the idea that cybercriminals are a major threat. This is why infrastructure integrity is necessary for business owners to know if they want to ensure their online safety. What

What is an Impersonation Cyber Threat?

Impersonation cyber-attack is on the rise and here is everything you need to know about such cyberattacks An impersonation cyber attack is when a threat actor impersonates to be someone else, generally someone you know or trust to get access to your sensitive information. Impersonation

Categories: