Search Results

The Widening Gap Between UK Cyber Risks and Preparedness: A Risk that Concerns the Nation’s Cyber Security Chief

By Pera Prometheus | 29/12/2024

Richard Horne, the head of the UK’s National Cyber Security Centre (NCSC), warned that the threats to the UK are wildly underestimated by both individuals and organisations. He stated that a sharp rise in severe cyber incidents, including attacks on healthcare, transportation, and other critical sectors, has become more frequent, sophisticated, and intense, as highlighted … Read more

The End of Passwords: Why Businesses Must Embrace Passkeys for Cybersecurity

By Pera Prometheus | 19/12/2024

Microsoft recently announced its intention to eliminate passwords for over a billion users worldwide, marking a pivotal shift toward secure, passwordless authentication. In light of this, businesses need to recognise the importance of modernising their security systems, as traditional passwords are no longer sufficient to combat evolving cyber threats. In 2024, password breaches surged by … Read more

The Silent Danger: Prolonged Cyber Attacks and Business Vulnerabilities

By Digi Gurkhas | 13/12/2024

When most of us think about cyberattacks, we imagine sudden, chaotic events; a Company’s systems crashing, customer data being stolen, or ransomware demanding payment overnight. However, some of the most effective cyber threats are conducted by stealth, operating in the shadows for months without detection. These forms of attacks are often motivated by more capable … Read more

Chinese Researchers Claim Military Grade Encryption Broken by Quantum Computer: Challenges For The Current Cryptographic System.

By Digi Gurkhas | 03/12/2024

The Claim In the recent news, chinese researchers claim to have used a D-Wave Advantage quantum computer to break specific encryption algorithms based on the Substitution-Permutation Network (SPN), a common structure in encryption. SPNs secure data by repeatedly substituting (replacing) and permuting (reordering) parts of it, and they are foundational to widely used encryption systems … Read more

Over 2000 Palo Alto Network Firewalls Compromised in Recent Cyberattack – Businesses Be-aware!

By Digi Gurkhas | 27/11/2024

In a recent significant cyberattack, over 2000 Palo Alto Network firewalls have been compromised by attackers exploiting two recently patched vulnerabilities. Palo Alto provides cybersecurity services to enterprises, government and service providers. According to UK based Shadow server Foundation the number of breaches in US and India on Palo Alto network firewalls were in the … Read more

T-Mobile Suffers Another Cyberattack in a Series of Breaches

By Digi Gurkhas | 21/11/2024

On 15 Nov 2024, Wall Street Journal (WSJ) reported that T-Mobile has suffered from a recent cyberattack which has been linked to the Chinese state-sponsored hacking group called Salt Typhoon. The attackers exploited vulnerabilities in network infrastructure to access sensitive communication data. While the company claims no customer data was stolen, the breach has raised … Read more

IOT-cybersecurity

A New Cyber Security Threat to IoT (Internet of Things) and Cloud Based Services Discovered

By Digi Gurkhas | 12/11/2024

 CloudSEK cybersecurity experts have recently discovered a significant threat with AndroxGh0st malware, which has now integrated the Mozi botnet to target IoT and cloud-based services. This combination expands AndroxGh0st’s reach, making it a powerful tool for cybercriminals to compromise various devices and networks, including cloud platforms like AWS and TwilioSendGrid. By merging with Mozi’s capabilities, … Read more

Social Engineering: Understanding Cybersecurity’s Human Element

By Digi Gurkhas | 07/11/2024

What is Social Engineering? Social engineering is among the most dangerous forms of cybersecurity attacks, often targeting psychological manipulation rather than technical systems. While advanced security systems protect software and hardware, these measures become ineffective when the human element is compromised. Social engineering is a cybersecurity concern for individuals and businesses alike, as it bypasses … Read more

How to Use Public Wi-Fi Safely: Top Security Tips & Common Risks

By Digi Gurkhas | 31/10/2024

Internet is deeply ingrained in the way we interact and do business in the modern world. It is now a necessity and we expect to have internet connections everywhere we go. Hence, the availability of public Wi-Fi networks has also become essential, both in the UK and globally, millions rely on it daily for everything … Read more

How to Choose the Right Cybersecurity Consultant: 5 Things to Consider

By Digi Gurkhas | 23/10/2024

Modern businesses are rapidly expanding their digital landscape, however, as a digital footprint increases so too does the cyber threat surface it is open to, therefore, it is crucial for businesses to safeguard their network and critical information. One way to achieve this is through support from a professional cybersecurity consultant. Generally, a consultant is … Read more