Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Organisations Can Prevent Phishing and Stop Modern Attacks

Phishing continues to be the most common way attackers gain initial access. If you want to prevent phishing in your organisation, it starts with understanding how these campaigns suceed and why they continue to bypass traditional controls. Drawing on insights from our recent webinar Red Team Insights: What We’ve Learned from Breaching the Best, this article explores the tactics attackers rely on and the steps security teams can take to strengthen their defences.

Why I Couldn't Ignore the Need for ThreatSpike Black

Last October marked a turning point for ThreatSpike. Not only did we start the conversations around our Series A funding round. But also the mission expanded, not just to protect companies from cyber threats, but to give any business, of any size, access to IT and security at a standard most people assumed was only possible for global corporations.

The Dark Side of Online Bookings: Infostealers and Phishing in the Hospitality Industry

The high profile MGM Resorts hack by ransomware group ALPHV/BlackCat has served as a wake up call to the hospitality industry, demonstrating that the industry is a lucrative target for cybercriminals. The hack was hugely impactful to MGM making for sensational headlines in mainstream media, however what struck security experts were the social engineering methods used by the threat actors and how effective they were in bypassing security controls and technologies.

Diskless Infostealer, Next-generation Delivery?

In a recent social-engineering attack targeting the hospitality sector observed by the ThreatSpike team, there appears to be a change in the tactics employed by the threat actor. The hospitality sector, where top-notch customer-service is expected, customer-facing employees are often lucrative targets for phishing, as detailed in our previous blog post.

Active Directory Dominance: Capitalising on IT Administrators' Poor Cyber Hygiene

Humans are the weakest link in cybersecurity, and it is inaccurate to say that IT administrators, who often have access to sensitive data and systems, are invulnerable. In this blog post, we demonstrate how a Red Team Operator achieved full Active Directory domain compromise as a result of an IT Administrators’ poor cyber hygiene.