Threat intelligence is an elusive concept. Cyber-security vendors have developed numerous definitions for it based upon different procedural viewpoints. As a result, the key concept and principle of threat intelligence … Continue reading Threat Intelligence Report: MageCart Malware
What springs to mind when you think of cyber security in education? It might be the responsibility to protect the data schools hold on pupils, staff and parents, including sensitive … Continue reading Cyber security in education
Hiring an in-house IT security function is often the first port of call for larger companies, however this can be an expensive route to take. With a skills shortage in … Continue reading Why should you outsource your cyber security?
GDPR guidelines state that data breaches now need to be reported within 72 hours of a cyber attack taking place. However, if you have not put adequate measures in place … Continue reading Could cyber threats grow under GDPR?
1. Introduction At Invinsec we are continually taking the fight to cyber criminals. StopPoint aims to empower our security operations staff with the right tool to effectively stop threats in … Continue reading Whitepaper: StopPoint empowers our expert cyber security team
Threat intelligence is an elusive concept. Cyber-security vendors have developed numerous definitions for it based upon different procedural viewpoints. As a result, the key concept and principle of threat intelligence … Continue reading Threat Intelligence Report: VPNFilter Malware
What is Social Engineering Social Engineering is the art of manipulating people into performing actions or divulgating confidential information. Social Engineering is a form of hacking that relies on influencing, … Continue reading Whitepaper: Social Engineering – Phishing Campaigns
Threat intelligence is an elusive concept. Cyber-security vendors have developed numerous definitions for it based upon different procedural viewpoints. As a result, the key concept and principle of threat intelligence … Continue reading Threat Intelligence Report: GandCrab Ransomware
Overall my experience of work shadowing at Invinsec has been very positive. All of the team were very engaging and attentive, ensuring that I had plenty of opportunities to learn … Continue reading Life at Invinsec by Zuzana Baxendale
We have been made aware of a type of malware called ‘The Vega Stealer Malware’, which is a variant of the ‘August Stealer’ malware. This threat contains a credential stealing … Continue reading Threat Intelligence Report: Vega Stealer
Businesses used to worry about break-ins. But now, criminals are more likely to come in through your inbox than a side door or window late at night. Cyber criminals want your data, your customer’s data, bank details, sensitive financial information and intellectual property.
We have been made aware of the latest form of ransomware to threaten organisations. SynAck ransomware adopts a new technique to infect computers – the ‘Doppelgänger’ approach. With the aim of infecting systems and encrypting victims’ files, SynAck uses this approach to transform files in order to bypass and avoid detection from anti-virus software. A demand is then made for a fee in order to release the files.
The invinsec Threat Intelligence Analysts have discovered a new malware exploit that is being seen on the web (researchers first discovered the exploit in August 2017 and immediately after, it was removed from the Chrome Web Store). In April 2018, researchers discovered a repackaged version of the malware with a few tweaks which had the additional capability to steal Facebook, Google and Cryptocurrency credentials amongst others.
We’re pleased to present our intuitive Security Operations Centre (SOC) solution built to exceed the National Cyber Security Centre (NCSC)’s security monitoring requirements, the Payment Card Industry Data Security Standard … Continue reading Whitepaper: Managing your security monitoring requirements using invinsec’s next generation intuitive Security Operations Centre (SOC)
Every year Gartner publishes its Magic Quadrants covering numerous markets within the technology sector. In February, Gartner released the Magic Quadrant for Managed Security Services, Worldwide; an area that we, … Continue reading Where’s the magic in Gartner’s quadrant?
BHSF, one of the country’s leading health and wellbeing providers, has chosen invinsec as its cyber security partner. invinsec differentiated from the competition because of its guaranteed fast response times, … Continue reading BHSF case study
Here’s how most articles about GDPR start … Have you heard of GDPR? Do you know that it’s coming into force soon? Did you know that if your business falls … Continue reading GDPR: Beware of business ambulance chasers
Many of our customers have been asking about Artificial Intelligence (AI) and Machine Learning: asking whether AI tools exist that can protect their businesses more effectively than conventional cyber security … Continue reading AI and cyber security – does it exist?
One significant frustration for CIOs, CISOs and senior IT professionals charged with data and system security is that, while there are many solutions on the market that provide tools for … Continue reading Next gen cyber security that’s revolutionary priced
“We chose invinsec over other market leading traditional SIEM solutions because they were far more proactive in their approach to the managed detection and response challenge. invinsec have thought outside … Continue reading Global Head of IT Arvato Financial Services
Cyber attacks in the retail and FMCG sector are not confined to ecommerce businesses such as with online payment fraud or distributor denial of service (DDoS) attacks. While these are … Continue reading Think retail is safe from cyber attacks? Think again…
2017 has been a tough year in cyber security. We’ve seen businesses, big and small, get hit by data breaches and cybercrime resulting in a steady stream of headlines; WannaCry, … Continue reading Things to consider when choosing a cyber security vendor
We know, it’s not your fault. You joined a financial services firm and inherited processes, software and systems that were installed by your predecessor, if not before. Given the choice … Continue reading The problem with your inherited legacy systems
Building your business’ reputation and brand image takes time – years even – and costs money. Investment in marketing, customer services and PR activities does not come cheap, yet it … Continue reading Protect your brand and reputation with these 5 ways to minimise data breaches
https://blog.checkpoint.com/2017/09/11/beware-bashware-new-method-malware-bypass-security-solutions/ It is picking up a lot of chatter amongst the security and IT community, and we suspect will soon be as widely spoken about as HeartBleed. Criminals are exploiting … Continue reading You’ll probably shortly be reading about a new piece of nastiness in security called Bashware:
For the recruitment industry, candidate data is what differentiates a successful recruitment agency or recruiter from those that fail to hit target. Recruitment agencies spend many years building up and … Continue reading Recruitment agencies and their candidates are a key target for today’s cyber-criminals
Why is cyber security management so often reactive? Typically, it’s because security is bolted on to existing network systems and architecture when vulnerabilities are identified or a threat hits home. … Continue reading Getting back to basics – building a secure network architecture
Most business owners, CEOs and CIOs are concerned about an unseen army of cyber criminals and hackers poised to attack their business, hold their IT systems and data to ransom … Continue reading The biggest IT security threats are often inside your own company
Are your IT teams and 3rd party suppliers taking ransomware seriously? Are you? Ransomware is on the increase as recent high profile incidents prove – WannaCry, Locky, CryptoLocker etc. being … Continue reading Ransomware – No excuse for sticking your head in the sand!