The Cyber Source blog

Cyber Security (and NOC Knowhow), in plain English

Real life cyber crime Video - #4 Phishing attack affects healthcare provider

By Comtact September 3, 2019

#4 "Big Phish"

Phishing attack affects major healthcare supplier.

Cyber criminals continue to..

[Video Story #3] Insufficient security spending can be 'RISKY BUSINESS'

By Comtact September 2, 2019

#3 "Risky Business"

Ransomware epidemic at UK top 40 university.

We’re living in a far more..

Real Life Cyber Stories: Data Theft [Video #2] - 'The Inside Job'

By Comtact August 29, 2019

#2 "The Inside Job"

Financial services company face an internal data theft.

Protecting yourself..

[VIDEO] Real Life Cyber Crime - Story #1 'The Ransomware Heist'

By Comtact August 28, 2019

#1 "The Ransomware Heist"

UK mid-sized law firm hit by ransomware attack, £2 million ransom..

Red Teaming: How can it save your business?

By Comtact August 20, 2019

Do you dare to deliberately have your security defences attacked?

Red Teaming is a concept that..

Phishing Statistics 2019 - The Shocking Truth

By Comtact August 7, 2019

Many organisations saw a shocking increase in social engineering throughout 2018, phishing..

9 cyber security training tips to make your employees the best line of defence

By Comtact July 30, 2019

Cyber security and associated vulnerabilities never seem to be out of the news. New scams, new..

How to apply the CIA triad to your organisation

By Comtact July 23, 2019

We’ve written before about the CIA triad – not a secret service vocal harmony group, but in fact..

TOP TIPS: How to protect against social engineering

By Comtact July 16, 2019

Social engineering is sometimes described as hacking the human mind. It doesn’t require a lot of..

Threat Intel July 2019: 77 vulnerabilities including 2 zero-days

By Comtact July 11, 2019

July 2019 Threat Intelligence (CRITICAL ALERT)

This month, Microsoft have patched 77..

What is the CIA triad?

By Comtact July 2, 2019

When you hear the acronym ‘CIA’, you naturally might think of the Central Intelligence Agency..

Human Hacking: A guide to social engineering

By Comtact June 25, 2019

It turns out you don’t always have to be good at manipulating code to hack into secure systems...

Sign-up for weekly updates

Recent Posts

Recent Posts