- Application Programming Interface (1)
- APT (5)
- ATM (3)
- Audit (2)
- Aviation (8)
- Backdoor (9)
- Banking (2)
- Behavioural Monitoring (1)
- bespoke (1)
- BlueKeep (1)
- Botnet (1)
- Brute force (3)
- Card Cloning (1)
- CISO (1)
- Code of Practice (1)
- Coding Error (1)
- Command & Control (2)
- Commentary (9)
- Compliance (1)
- Consumer Data (1)
- Credential Stuffing Attack (1)
- Credentials (3)
- Credit Card Skimming (2)
- Cryptocurrency (1)
- Cryptojacking (2)
- Cryptominer (1)
- Crytomining (1)
- customised (1)
- Cyber Espionage (5)
- Cyber Incidents (1)
- CyberFusionCentre (1)
- CyberMaturityStudy (1)
- CyberResilience (1)
- Cyberthreatintelligence (1)
- Darknet (2)
- Data (1)
- Data Backup (1)
- Data Breach (18)
- Data Leak (6)
- Data Loss (2)
- Data Security (3)
- Data Theft (2)
- Database (7)
- Database Management System (1)
- Database Security (2)
- datasecurity (1)
- DDoS (3)
- Defence-in-Depth (1)
- Denial-of-service (1)
- DNS (1)
- Downloader (2)
- E-Commerce (4)
- Education (19)
- Elevated Privileges (2)
- Email Credentials (2)
- Emotet (3)
- Encryption (3)
- Entertainment System (1)
- Exploit kits (1)
- Exploits (5)
- Festive Season (1)
- Financial Services (17)
- Firmware (1)
- Formjacking (1)
- Fraud (2)
- Government (16)
- Hacktivist (1)
- Healthcare (20)
- Identify Theft (1)
- Industrial Control Systems (1)
- information (1)
- Injection Attacks (1)
- Insecure Direct Object Reference (1)
- intelligence (1)
- Internal Source Code (1)
- IOS XE Operating System (1)
- IoT (1)
- JavaScript skimming code (2)
- jigsaw (1)
- Keylogger (1)
- Lateral Movement (1)
- Load Balancer (1)
- Login Credentials (6)
- LOLbins (1)
- Macros (1)
- Malspam (2)
- Malware (15)
- Maritime (2)
- Media and Entertainment (13)
- Misconfiguration (4)
- Mobile (1)
- MS-SQL (1)
- netflowmonitoring (1)
- Network Compromise (1)
- Non-profit (2)
- Online Fraud (1)
- Operational Technology (1)
- Password Management (1)
- Password spraying (1)
- Patching (6)
- Patient Data (3)
- Payment Card Data (8)
- Penetration Testing (1)
- Persistence (1)
- Personal Data (9)
- Personally Identifiable Information (12)
- Phishing (24)
- Point-of-Sales (3)
- Political Organisations (1)
- potential (1)
- PowerShell (2)
- Privilege Escalation (1)
- puzzle (1)
- Rail (1)
- Ransomware (23)
- RATs (3)
- Recommendations (1)
- Remote Access Tool (1)
- Remote Code Execution (1)
- Remote Desktop Protocol (2)
- Scams (1)
- Security Patch (1)
- Security Update (2)
- SHTML (1)
- Social Engineering (3)
- solution (1)
- Spear Phishing (4)
- State-sponsored attacks (1)
- Stealer Malware (1)
- Supply Chain (1)
- Third-Party Service Provider (2)
- ThreatHunting (1)
- tracking (1)
- Training&Enablement (1)
- Transport (15)
- TrickBot (1)
- Trojan (4)
- Two Factor Authentication (1)
- UEBA (1)
- Unauthorised Access (1)
- User Access Controls (1)
- VPN (2)
- Vulnerability (13)
- Watering Hole (2)
- Web Application (3)
- Web Skimming (2)
- Website Defacement (4)
- Zero-day Vulnerability (2)
Ensign Content

Weekly Cyber News
Maritime-Theme Phishing Emails Spread NanoCore RAT
A phishing campaign is spreading the NanoCore remote access tool using emails that look like shipping information from a reputable logistics company.
Ensign Content

Weekly Cyber News
Banking Trojans, RAT Distributions Increase in 3Q 2019
A recent report highlighted that more banking trojans and remote access tools were detected in the third quarter of 2019.
Ensign Content

Weekly Cyber News
International Aviation Agency Conceals Serious Hack
The International Civil Aviation Organization (ICAO) apparently suffered a large-scale cyberattack in 2016 that affected its web and email servers.