![](https://secureteam.co.uk/wp-content/uploads/2023/07/Graphic.png)
Trusted Cyber Security Experts
25+ Years Industry Experience
Ethical, Professional & Pragmatic
![](https://secureteam.co.uk/wp-content/uploads/2022/12/shutterstock_2212293913-300x169.jpg)
![](https://secureteam.co.uk/wp-content/uploads/2022/12/shutterstock_2212293913-300x169.jpg)
Endpoint Detection Systems Used as Data Wipers
Endpoint detection and response (EDR) systems, and antivirus (AV) software, are used to increase the cybersecurity of a device. However, these security software solutions are now able to be exploited
![](https://secureteam.co.uk/wp-content/uploads/2022/12/shutterstock_1176723331-300x187.jpg)
![](https://secureteam.co.uk/wp-content/uploads/2022/12/shutterstock_1176723331-300x187.jpg)
The Threat of Holiday DDoS Attacks
Distributed Denial of Service (DDoS) attacks are on the rise, with the second half of 2021 showing a 43% increase in attacks since the first half of the same year.
![](https://secureteam.co.uk/wp-content/uploads/2022/11/shutterstock_1260320983-300x169.jpg)
![](https://secureteam.co.uk/wp-content/uploads/2022/11/shutterstock_1260320983-300x169.jpg)
Android Trojan Apps are a Continued Threat
Malicious Android apps posing as file managers have been identified and removed from the Google Play Store recently after infecting tens of thousands of users with a SharkBot banking trojan.
![](https://secureteam.co.uk/wp-content/uploads/2022/11/shutterstock_2023392170-1-300x161.jpg)
![](https://secureteam.co.uk/wp-content/uploads/2022/11/shutterstock_2023392170-1-300x161.jpg)
Evolving Cyber Security Threats in 2022
The threats faced in cyber security are constantly evolving, with state actors taking part in cyber espionage, and cyber criminal groups creating paid-for campaigns and offering services for hire. The
![](https://secureteam.co.uk/wp-content/uploads/2022/10/shutterstock_642045208-1-300x215.jpg)
![](https://secureteam.co.uk/wp-content/uploads/2022/10/shutterstock_642045208-1-300x215.jpg)
Vice Society: Opportunistic Ransomware Group
The threat group tracked as DEV-0832 by Microsoft’s security threat intelligence analysts, also known as Vice Society, are a group of cyber criminals that are thought to have been active
![](https://secureteam.co.uk/wp-content/uploads/2022/10/shutterstock_1793121997-scaled-1-300x177.jpg)
![](https://secureteam.co.uk/wp-content/uploads/2022/10/shutterstock_1793121997-scaled-1-300x177.jpg)
Microsoft Azure Vulnerability Exploit in SF Clusters
A spoofing vulnerability in Microsoft Azure Service Fabric can be exploited by attackers to gain admin privileges and take over Service Fabric clusters. Although there are not currently reports of
![](https://secureteam.co.uk/wp-content/uploads/2022/09/shutterstock_302442911-scaled-1-300x200.jpg)
![](https://secureteam.co.uk/wp-content/uploads/2022/09/shutterstock_302442911-scaled-1-300x200.jpg)
The Current and Future Trends in Cyber Crime
The release of the 2022 Falcon OverWatch Threat Hunting Report from CrowdStrike has revealed the recent trends in cyber crime from July 2021 to June 2022. According to the report,
![](https://secureteam.co.uk/wp-content/uploads/2022/09/shutterstock_1445884679-scaled-1-300x200.jpg)
![](https://secureteam.co.uk/wp-content/uploads/2022/09/shutterstock_1445884679-scaled-1-300x200.jpg)
Twilio Targeted in Latest ‘0ktapus’ Phishing Attacks
A large-scale phishing attack was recently launched against employees at Twilio, a global cloud-based communications and infrastructure company. Phishing text messages were sent to employees, impersonating Twilio’s IT department, with
![](https://secureteam.co.uk/wp-content/uploads/2022/08/shutterstock_2033447216-scaled-1-300x169.jpg)
![](https://secureteam.co.uk/wp-content/uploads/2022/08/shutterstock_2033447216-scaled-1-300x169.jpg)
NOBELIUM’s Backdoor Malware: MagicWeb
Microsoft’s Threat Intelligence Center (MSTIC) have recently discovered a new malware capability that NOBELIUM are using called MagicWeb. Highly active threat actor NOBELIUM are known for targeting organisations across Europe,
![](https://secureteam.co.uk/wp-content/uploads/2022/08/shutterstock_700125367-scaled-1-300x188.jpg)
![](https://secureteam.co.uk/wp-content/uploads/2022/08/shutterstock_700125367-scaled-1-300x188.jpg)
What is Zeppelin Ransomware?
Ransomware is the biggest cyber threat for UK organisations according to the National Cyber Security Centre (NCSC), with the number of different types of ransomware doubling this year already, from
![](https://secureteam.co.uk/wp-content/uploads/2022/07/shutterstock_1929246119-scaled-1-300x200.jpg)
![](https://secureteam.co.uk/wp-content/uploads/2022/07/shutterstock_1929246119-scaled-1-300x200.jpg)
LinkedIn the Top Phishing Brand in Q2 2022
Phishing is the most common cyber attack vector, and while email is well known for phishing, increasingly LinkedIn is being used as well. End-user phishing was the initial access point in
![](https://secureteam.co.uk/wp-content/uploads/2022/07/shutterstock_1927192157-scaled-1-300x200.jpg)
![](https://secureteam.co.uk/wp-content/uploads/2022/07/shutterstock_1927192157-scaled-1-300x200.jpg)
Phishing Attacks That Can Bypass MFA
A large-scale phishing attack campaign has emerged using adversary-in-the-middle (AiTM) to steal credentials and circumvent multi-factor authentication (MFA) needs. Microsoft have released a security blog post regarding the use of
Subscribe to our monthly newsletter today
If you’d like to stay up-to-date with the latest cyber security news and articles from our technical team, you can sign up to our monthly newsletter.
We hate spam as much as you do, so we promise not to bombard you with emails. We’ll send you a single, curated email each month that contains all of our cyber security news and articles for that month.