Microsoft Security have issued a detailed report on a massive phishing-as-a-service operation named BulletProofLink that offered as a subscription all the tools needed to conduct a campaign. The phishing-as-a-service, or PHaaS, model differs from the phishing kits that many gangs have used in that it is more expansive and handles many of the small details that could befuddle a less tech-savvy attacker.

Businesses, and anyone caught in a bad-tempered divorce, should be on the alert for mercenary hackers for hire. Firms large and small have been victim to keypad for hire gunslingers who possess tech savvy skills to breach the most sophisticated defences.

Our digital activity could increase the number of cyber threats we receive. For example, logging onto Netflix, shopping online or using internet banking. If one of these accounts is hacked, log in information, messages or financial data could be accessed from different accounts across the internet.

Fewer people are testing positive for COVID-19 and lockdown is easing. However, attention has now turned to how we can prevent a second wave and prevent the transmission of the virus.

The Cloud is a network of servers where each has a different function. Serviceteam IT has written a series of blogs surrounding the benefits and uptake of the cloud and in 2017 and 2018’s research reports. However, when you are choosing a cloud security provider, organisations will need to consider the level of data privacy and security at risk.

Do you find yourself constantly reading about cyber-security attacks on individuals and businesses? Often reading regional statistics, national impacts and what individuals can do to prevent an attack? Have you seen the potential effect of a global attack? A coordinated global cyber-security attack could have an economic impact of up to $193bn.

A teen in Argentina has become the first bug bounty hacker to become a millionaire. He was self-taught. Interestingly however, the hacking was with the aim of creating a safer internet. Legal hacking? What is it and how does it work?

According to the Cyber Governance Health Check, top UK boards still do not understand the impact of a cyber-attack. Here is a quick guide about why this might be and steps to improve this situation.

Entrepreneurs trying to grow their businesses are juggling so many demands on their time that they may find themselves unwittingly leaving the back door open to cybercriminals.