Microsoft recently announced its intention to eliminate passwords for over a billion users worldwide, marking a pivotal shift toward secure, passwordless authentication. In light of this, businesses need to recognise the importance of modernising their security systems, as traditional passwords are no longer sufficient to combat evolving cyber threats. In 2024, password breaches surged by … Read more

When most of us think about cyberattacks, we imagine sudden, chaotic events; a Company’s systems crashing, customer data being stolen, or ransomware demanding payment overnight. However, some of the most effective cyber threats are conducted by stealth, operating in the shadows for months without detection. These forms of attacks are often motivated by more capable … Read more

The Claim In the recent news, chinese researchers claim to have used a D-Wave Advantage quantum computer to break specific encryption algorithms based on the Substitution-Permutation Network (SPN), a common structure in encryption. SPNs secure data by repeatedly substituting (replacing) and permuting (reordering) parts of it, and they are foundational to widely used encryption systems … Read more

In a recent significant cyberattack, over 2000 Palo Alto Network firewalls have been compromised by attackers exploiting two recently patched vulnerabilities. Palo Alto provides cybersecurity services to enterprises, government and service providers. According to UK based Shadow server Foundation the number of breaches in US and India on Palo Alto network firewalls were in the … Read more

IOT-cybersecurity

 CloudSEK cybersecurity experts have recently discovered a significant threat with AndroxGh0st malware, which has now integrated the Mozi botnet to target IoT and cloud-based services. This combination expands AndroxGh0st’s reach, making it a powerful tool for cybercriminals to compromise various devices and networks, including cloud platforms like AWS and TwilioSendGrid. By merging with Mozi’s capabilities, … Read more

Modern businesses are rapidly expanding their digital landscape, however, as a digital footprint increases so too does the cyber threat surface it is open to, therefore, it is crucial for businesses to safeguard their network and critical information. One way to achieve this is through support from a professional cybersecurity consultant. Generally, a consultant is … Read more

Cyber Security

Is your business safe from the increasing Software as a Service (SaaS) Attacks? If your company relies on cloud-based apps to manage day-to-day operations, you may unknowingly be sitting on a ticking time bomb. For many companies, it’s not a matter of if they’ll be attacked but when. Organisations utilising SaaS platforms to conduct their … Read more