Aabyss Blog Heading Background

News & Opinion

Gain the edge on the world of business technology and cyber security

Wordpress Sites Hacked to Propagate Scam Campaign

on 29-Jan-2020 14:28:15 By | Andrew Allen | 0 Comments | Cybersecurity Technology
The hacking campaign makes use of previously known vulnerabilities in WordPress plugins. Some of the vulnerable plugins exploited include the ‘CP Contact Form with PayPal’ and the ‘Simple Fields’. More than 2000 WordPress sites have been hacked by cybercriminals for a scam campaign that redirects visitors to several scam sites.
Read More

Ransomware Operators turn evil for late and non-paying victims

on 29-Jan-2020 14:27:09 By | Andrew Allen | 0 Comments | Cybersecurity Technology
A group of ransomware actors have threatened to publish data stolen from a German automotive supplier. Another group announced that they are going to release 9.5GB of data of a healthcare firm. Source: https://cyware.com/news/ransomware-operators-turn-evil-for-late-reposnders-and-non-paying-victims-de65c7c1
Read More

Ransomware: Don't let your business be defrauded too

on 13-Jan-2020 16:31:58 By | Andrew Allen | 0 Comments | Cybersecurity Technology
The cyber threat is very real; a breach in cyber security resulting in the theft, loss or corruption of data, occurs every second in businesses and homes around the globe.
Read More

Watch out for Online Identity Theft

on 13-Jan-2020 09:54:38 By | Andrew Allen | 1 Comment | Cybersecurity Technology
In this day and age, most of us spend our time online. Whether it’s on social media, online shopping or informative pages – you’ll find it hard to disagree with us that crucial information related to ourselves dwells in the online world.
Read More

Hackers strike again with a new Ransomware plot.

on 30-Dec-2019 10:06:28 By | Andrew Allen | 0 Comments | Cybersecurity Technology
Ransomware gangs have signalled to publish the data stolen from victims who refuse to pay the ransom. Cybercriminals behind the Maze ransomware have erected a website on the public internet that identifies recent victim companies that opted not to pay a ransom. Ransomware gangs have now upped the ante of their attacks to cause massive losses for victim organisations. They have signalled to publish the data stolen from victims who refuse to pay the ransom.
Read More

Cybersecurity in 2019: Expectation Vs Reality

on 30-Dec-2019 10:05:37 By | Andrew Allen | 0 Comments | Cybersecurity Technology
In 2019, 32 percent of breaches and 78 percent of cyber-espionage incidents were carried out through phishing attacks. Automation gained grounds in security operations across many organisations this year. To make growth in the right direction, it’s important to learn from history and carve the future strategies accordingly. The year 2019 saw cybersecurity technology advancing and evolving new tools and techniques to meet the challenges posed by the latest cyber threats. In fact, many also predicted last year about how the attack tactics of adversaries would grow, what technologies would play a critical role in shaping the future of cybersecurity, and more.
Read More

The Most Common Passwords Found From Breaches in 2019

on 30-Dec-2019 10:05:02 By | Andrew Allen | 0 Comments | Cybersecurity Technology
Researchers analysed data leaked in various data breaches to bring this study forward. Passwords ‘12345,’ ‘123456,’ and ‘123456789’ were the most common passwords, followed by ‘test1’ and, of course the password ‘password’. A bunch of independent anonymous researchers composed a list of 200 most popular passwords that were leaked in data breaches during 2019 and shared it with security firm NordPass.
Read More

The Tale of Ali Baba Is Why We All Need Multi-Factor Authentication!

on 13-Jun-2019 11:56:14 By | Keith Smith | 1 Comment | Cybersecurity
One day, Ali Baba, a poor woodcutter is out hard at work chopping wood in the forest, when he is suddenly distracted. Paying closer attention, he overhears a band of thieves gaining access to a magical cave containing vast treasures. Equipped with the secret password he waits until they depart and makes for the entrance of the magic cave. Once upon it, he merely repeats the words “Open Sesame” and with that enters and makes off with the treasure.
Read More

5 Traits to Look for in an Effective CIO

on 05-Jun-2019 09:57:04 By | Andrew Allen | 0 Comments | Management Strategy
There are times when you do not have the technology expertise required within your company to plan a project or to solve a problem that feels like it is crippling one or more business operations. There is no need to feel discouraged.
Read More

Aabyss - Dark Web Experience

on 03-Jun-2019 12:43:50 By | Greg Jones | 0 Comments | IT News
Have you ever wondered about the Dark Web or would you like to see a LIVE disaster demo? Why not spend a morning exploring the Dark Web in a safe and secure environment with Aabyss!
Read More