Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Top three cyber threats that will persist in 2025

As another year comes to an end, it’s not only Santa who brings presents for those on his nice list. These days, it’s quite common for well-known firms to publish their annual roundups of the most notable events that have taken place in the cybersecurity landscape, together with predictions of what can we expect in next twelve months.

What is an Endpoint and Why It's Important in Cybersecurity

These days, everything is connected to everything else. Endpoints are the most important parts of modern networks because they let people communicate and run processes. But what does an ending really mean? An endpoint is any device that can join a network. This includes laptops, smartphones, tablets, servers, and even Internet of Things (IoT) devices like smart thermostats and wearable tech. People can connect to networks with these devices, but they also have security holes that hackers can use.

Living Up to Its Name: Alleged Extortion Group LeakedData Begins to Leak Data

Data leaks sites (DLSs) commonly debut with a small number of claimed victims. When Cyjax discovered them, newly found DLSs for extortion groups FunkSec and Kairos claimed 11 and six victims, respectively. In contrast, a newly identified possible extortion group which aptly calls itself ’LeakedData’ has emerged onto the scene with an alleged total of 41 victims.

BADBOX Botnet Is Back

Imagine this: you're at home, eagerly waiting for the new device you ordered from Amazon. The package arrives, you power it on, and start enjoying all the benefits of 21st century technology—unaware that, as soon as you powered it on, a scheme was unfolding within this device. Welcome to the world of BADBOX. BADBOX is a large-scale cybercriminal operation selling off-brand Android TV boxes, smartphones, and other Android electronics with preinstalled malware. What does this mean?

Early Identification of Comprised Systems: Hybrid Threat Detection with the Magic of DNS

In today’s rapidly evolving threat landscape, the ability to detect and neutralize threats before they inflict damage is critical. This session will showcase how combining multiple log collection strategies can supercharge your threat detection capabilities. By merging traditional DNS logs from your domain controllers with DNS alerts from Cisco Umbrella, you'll gain unprecedented insight into compromised systems at the earliest stages of an attack.

BDRSuite v7.1.5 is Generally Available Now!

We are excited to announce our latest release, BDRSuite v7.1.5! This version offers a host of new features, enhancements, and bug fixes to improve your backup experience and make the process smoother and more reliable. This blog post will take you through all the latest features and enhancements. Don’t just take our word for it—download a free trial today and experience the latest version of BDRSuite firsthand.

Elastic Security is a top performer in the latest AV-Comparatives Business Test

Delivering exceptional performance and protection in rigorous evaluations Elastic Security has achieved remarkable results in the recent AV-Comparatives Business Security Test. This independent assessment underscores our commitment to providing world-class malware protection.

How the Cyber Essentials Certification Can Help Your Business

Cybersecurity is a vital concern for organisations, but many security strategies fall short: recent research shows that 44% of UK companies are lacking in basic cybersecurity skills. The consequences of poor security go far beyond the direct impacts of cyberattacks, and the benefits of effective security are numerous as well.

London's CNI is Under Threat

London is one of the smartest and most interconnected cities in the world. Digital infrastructure plays a role in almost every facet of society, streamlining public transport, improving healthcare provision, boosting sustainability, and more. However, this reliance on technology has left London’s critical national infrastructure (CNI) perilously vulnerable to digital attacks.