Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is Domain Hijacking? Tips to Protect Yourself

Domain hijacking is the act of domain name theft. It can happen to individuals or organisations and it’s increasing in frequency. The name may be hijacked by someone else who passes themselves off as you, tricks your domain registrar into transferring your domain to them, or hacks into your account (sometimes through phishing) and transfers it themselves.

What is Encryption? Difference between symmetric and asymmetric encryption

Encryption is the act of encoding information to make it unreadable for anyone other than those who are authorized to read it. There are two types of encryption: symmetric and asymmetric. Symmetric encryption uses the same key to encode and decode data, while asymmetric encryption uses different keys - one public key that can be shared with everyone, and one private key only known by the owner. In this video, we discuss the meaning of encryption and what it is used for. We also go over what asymmetric and symmetric encryption are.

SMB Ports Explained: 445 and 139 - Learn the difference

In this video I go over the difference between SMB ports 445 and 139. It's important to know how these two ports can help you keep your network safe from attack, so watch this video if you want to learn more about them! Cyphere is a UK-based cyber security services provider helping organisations to secure their most prized assets. We provide technical risk assessment (pen testing/ethical hacking) and managed security services. This advice is a true third party opinion, free from any vendor inclinations or reselling objectives.

ISO 27001 Penetration Testing: What Is It And Why You Need It

ISO 27001 is an international information security standard. You may have heard of it, but do you know what it really means? What does ISO 27001 penetration testing mean for your company's cyber-security efforts? And why should you care about implementing ISO 27001 in the first place? Watch this video to find out!

Azure Penetration Testing | How to Stay Safe

Azure Penetration Testing is a process that can be done to find vulnerabilities in the Azure environment. In this video, I will show you how to stay safe by finding and mitigating these vulnerabilities before attackers do! Cyphere is a UK-based cyber security services provider helping organisations to secure their most prized assets. We provide technical risk assessment (pen testing/ethical hacking) and managed security services. This advice is a true third party opinion, free from any vendor inclinations or reselling objectives.

What are Open Ports - Learn what open ports are and why they're essential

Open Ports are essential for you to have a safe internet experience. Learn what open ports are and why they're important for you to have a secure connection! Cyphere is a UK-based cyber security services provider helping organisations to secure their most prized assets. We provide technical risk assessment (pen testing/ethical hacking) and managed security services. This advice is a true third party opinion, free from any vendor inclinations or reselling objectives.

AWS Pentest Beginners Guide - Tools and Techniques

AWS Penetration Testing Guide This video is an informational video about the pentesting service we offer at Security Audit. Here you will learn how our pentesting team can help you with AWS penetration testing and what it entails. Cyphere is a UK-based cyber security services provider helping organisations to secure their most prized assets. We provide technical risk assessment (pen testing/ethical hacking) and managed security services. This advice is a true third party opinion, free from any vendor inclinations or reselling objectives.

What are Traffic Bots? Methods to detect and stop Bot traffic!

Bot traffic is a type of traffic that is generated by automated programs, or bots. These bots can be used to generate fake traffic for testing purposes or to engage in malicious activities. Malicious bot traffic is a huge problem for many website owners, and bot detection can be difficult. There are various types of bot traffic that you need to watch out for. In this guide, we will discuss their different types and how to combat them!

What is Domain Hijacking? Tips to Protect yourself

Domain hijacking is the act of domain name theft. It can happen to individuals or organisations and it’s increasing in frequency. The name may be hijacked by someone else who passes themselves off as you, tricks your domain registrar into transferring your domain to them, or hacks into your account (sometimes through phishing) and transfers it themselves.