Cyber Attack Number 4/15: Botnet Attacks

Cyber Attack Number 4/15: Botnet Attacks

Short for Robot Network, a Botnet is when a group of computers anywhere in the world are all infected by malware to create a network of interconnected computers that can be used by hackers for numerous types of Cybercrimes.

Learn how to best mitigate your risk of a Botnet Attack.

Read More

Cyber Attack Number 3/15: Drive By Attacks

Cyber Attack Number 3/15: Drive By Attacks

Do you have a WordPress site? Are you sure you’re keeping the plugins updated?

Drive By Attacks

Hackers might exploit a vulnerability and inject a malicious code and more. Visitors to the site might get infected by malware, leading to loss of trust and reputation, and loss of customers.

Read More

Cyber Attack Number 2/15: Phishing and Spear Phishing

Cyber Attack Number 2/15: Phishing and Spear Phishing

It’s a normal day, you receive an email that someone has shared a OneDrive document with you. When you click on the link it asks you to log in to your Office 365 account. You enter your credentials and nothing happens…

You’ve Been Phished

Once you enter your credentials the hackers now have access to your email account. Then they just watch and wait.

Read More

15 Types of Common Cyber Attacks Series

15 Types of Common Cyber Attacks: What are they, how do they happen, and what you can do to mitigate your risk.

We've decided to start a 15 part series, inspired by an infographic shared by Dan Williams from CrowdStrike. Thanks Dan!

In this series, we will be explaining in real world terms how these hacks occur, giving some real-life examples, and advice on what you can do to mitigate your risk.

Look out for part 1/15: Man in the Middle (MITM) Attacks.

Below is an introduction video by our Founder and Leader, Martin (Marty) Haak.