
BLOG: How Secure Is Two Factor Authentication?
Implementation of two-factor authentication is often the advice provided by cybersecurity professionals worldwide when a high-profile phishing attack makes the news. Two-factor authentication is a
Read the latest blog posts from our expert analysts, and news about the company
Implementation of two-factor authentication is often the advice provided by cybersecurity professionals worldwide when a high-profile phishing attack makes the news. Two-factor authentication is a
Ransomware attacks have been one of the critical moments of 2021 that signify how the cyber threat landscape has changed. While ransomware was a major
DDoS Attacks and Gaming Gaming has been described as a hotbed for DDoS attacks[1]. Gaming platforms are no strangers to network disruption compromises, however, when
A QR code (Quick Response code) is a type of barcode that can be read easily by a digital device and which stores information as
Last week it was found that NatWest is facing the possibility of a fine of up to £320m following the bank’s admission of money laundering.
Last year, Phishing and Pharming were among the top types of cybercrime most frequently reported worldwide. Pharming is a form of social engineering cyberattack that sees
Following an abrupt departure for two months, several of the dark-web servers belonging to REvil came back online recently, The REvil led blog ‘Happy Blog’
Ragnar Locker operatives this week have cautioned victims against soliciting the help of recovery companies and have issued a notice on their darknet website that
On Monday, Spyware researchers obtained what is believed to be a new exploit from NSO Group’s Pegasus surveillance tool that was at the centre of
Stalkerware is a term used to refer to software applications that are specifically designed to track individuals while hiding from view. Numerous stalkerware applications market
Cryptojacking was at the centre of a lot of controversy in 2017 and 2018 but slowly died down in 2019 due to the shutdown of
A vulnerability is a weakness or error in a system/device’s code that can compromise the confidentiality of sensitive data through unauthorised access, the elevation of
© Orpheus Cyber Limited. All rights reserved