Telegram: A Thriving Hub of Criminal Activity

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Telegram

Secure messaging platforms have long since been in the middle of ethical debates, primarily over their use. They indeed allow users a chance to attain the online security they deserve and help protect personal information from data snoopers. In contrast, it is also true that these platforms can become the hub of cybercriminal activity due … Read more

Can VPNs Stop DDoS Attacks?

Author(s):

Harry Wilson, Head of Digital Marketing Department, Globex Outreach

Can VPNs Stop DDoS Attacks?

The whole point of a website is to be up and running 24/7; however, cybercriminals can attack at any moment, forcing you offline. They can use Distributed Denial of Service (DDoS) attacks to interrupt your business and impact your revenue. In a DDoS attack, attackers send thousands of unwanted requests to the servers, preventing legitimate … Read more

How to Tell if Your Wireless Router Has Been Hacked

Author(s):

Harry Wilson, Head of Digital Marketing Department, Globex Outreach

How to Tell if Your Wireless Router Has Been Hacked

Routers are hardware devices used by ISPs (Internet Service Providers) to connect their customers to their xDSL or cable internet network. Wi-Fi routers or wireless routers combine wireless access points, networking functions, and a router. In essence, routers connect local networks to the internet or other local networks; thus, wireless access points connect devices to … Read more

Purple Teaming: A Key Solution in Addressing Evolving Threats

Author(s):

MK Akram, Project Manager, Globex IT Solutions

Purple Teaming - USCYBERCOM

From the SolarWinds attack to the attempt to poison Florida city’s water supply and the Colonial Pipeline shutdown due to ransomware, recent months have demonstrated how aggressive cybercriminals have become—which raises the question: are modern cybersecurity solutions really that ineffective? With one major attack after another, the expectation is that organizations would have already undertaken … Read more

Bots: to Block or Not to Block? Effective Bot Management Strategy

Author(s):

Emma Yulini, Outreach Manager, Rise Digital

Bot Management - Good Bots - Malicious Bots

A significant portion of users visiting your site are not human. In 2017, more than 50% of internet traffic came from bots, and while there have been some improvements in recent years, today it’s estimated that more than 40% of all internet traffic comes from bots, and around 25% comes from malicious, bad bots. Malicious bots … Read more

Addressing the Rapidly Growing Threat of Wire Fraud

Author(s):

Matt Lindley, COO, CISO, NINJIO

Wire Fraud

Most cyber-attacks are intended to steal sensitive and personal information, which can later be used to breach accounts, hijack a victim’s identity, or steal money. However, some cybercriminals opt for a more direct form of theft, they send fraudulent requests that ask victims to complete a wire transaction and send money straight to them. This … Read more