- Home
- Services
- Resources
Featured Report
Latest Research
- Company
- Contact Us
Blog
Background A mid-sized London Accounting firm specialising in tax consulting and financial advisory, for UK and US/EMEA clients, faced a growing concern regarding cyber threats. With an increase in phishing attempts and social engineering attacks targeting the financial sector, the firm needed a robust solution to improve cybersecurity awareness among employees. Protecting sensitive client data […]
Cultivating Cyber Secure Behaviour in Education From widening access to information, to remote learning and accessibility, technology has had many positive influences on the education sector. However, the emergence of new technology has inadvertently created novel ways for attackers to conduct their fraudulent activity, whether that be against schools, staff, or students. As a result, […]
Cultivating Cyber Secure Behaviour in Finance Technology has revolutionised the way the finance industry operates, giving significantly greater control to the end-user over their finances. However, the digitisation and automation of the finance sector has inadvertently created novel ways for attackers to conduct their fraudulent activity , whether that be against the individual and/or the […]
Sign Up Now Protect your people, clients and bottom line with Republic – Small Business Edition Developed by Recyber, Republic is an advanced Behavioural Detection and Response (BDR) platform designed to enhance organisational cybersecurity by focusing on human behaviour. Recyber recognises that small businesses need to make every penny count. From as little as £1.99 […]
Believe it…despite the best technical defences, if the human is not secure then the system isn’t either Real-world example: 2016 Democratic National Committee (DNC) hack. Phishing Tactics Hackers sent phishing emails to several DNC staff members, masquerading as Google security warnings. • The emails claimed there was suspicious activity on their Google accounts and urged […]
Believe it…your data is at risk, so be careful who you choose to share it with. Real-world example: 2020 MGM Resorts Data Breach In 2020, hackers obtained a database containing the personal information of over 142 million MGM Resorts guests and posted it for sale on a dark web marketplace. The data included names, addresses, […]
Not quite…the Twitter accounts of several high-profile influencers were accessed to facilitate a widespread social engineering attack. Not everyone is who they say they are. Real-world example: 2020 Twitter Bitcoin Scam In July 2020, attackers gained access to Twitter’s internal tools and compromised several high-profile accounts, including those of Elon Musk, Jeff Bezos, Barack Obama, […]
A great example of a phishing attack is a “spoofed email from a trusted company.” Below is a detailed scenario: Example “Your Bank Account Needs Verification” Scenario An attacker sends an email that appears to come from a legitimate bank, like Wells Fargo or Chase. The email is designed to exploit the recipient’s trust by […]
Believe it…there are many types of cyberattacks where https could have prevented or mitigated the attack, primarily those involving Man-in-the-Middle (MITM) attacks. Real-world example: The Firesheep Attack What Happened? Firesheep was a browser extension that allowed attackers to hijack user sessions on websites that did not enforce https for all communications. The Mechanism Firesheep exploited […]
Not quite…ignoring warnings and failing to apply patches to your system can lead to devastating consequences. Target found out the hard way. Real-World Example: Target Breach One well-documented breach caused by failure to patch vulnerabilities is the Target data breach in 2013, which exposed the credit and debit card information of over 40 million customers. […]