Our Work
Blog Posts
The latest cyber resilience related blogs by the CYBX team
The Approach for Denial of Service
Denial of service is a well-recognised and notorious attack, designed to target either an individual or a business to overload their infrastructure. This article will provide an overview for denial of service attacks, how they are performed and some techniques that attackers use to pass by undetected. With a standard denial of service attack, the[…]
Social Engineering Defensive Measures
Social Engineering is becoming far more prevalent in recent years. The attacker can target a large number of individuals for a generic offer or a smaller subset of individuals with a very specific approach tailored on a per-person basis. The key difference between technical exploitation and social engineering is that, besides training, it is difficult[…]
NetBIOS
NetBIOS was created in the 1980’s by Microsoft and is primarily found on Windows devices and is still used today to conduct core functions within a network. It is an API that allows legacy software on different computers and hardware equipment to communicate within a Local Area Network (LAN). Without proper configuration, NetBIOS can be[…]
Knowing your Cyber Security approach
Cyber Security is a large market filled with products and services. It can be difficult to identify which approach is best suited for your business, and what will offer the highest value for your investment. Our article this week aims to help you to feel more confident exploring the wide variety of products and services,[…]
Google Home & Amazon Alexa Vulnerability
A team of security researchers at SRLabs in Berlin have recently discovered several vulnerabilities within voice controlled smart devices such as Google Home & Amazon Alexa. These vulnerabilities can allow an attacker to eavesdrop via the victim device. Researchers have discovered that some applications process user requests as normal but will then continue to listen[…]
Vulnerability scan
A vulnerability is a flaw that could be exploited by a malicious actor to gain access to data they are not authorised to view. A vulnerability scanner will connect to a device, network or website and run through a database that is populated with vulnerabilities to determine whether the target specified could be exploited. There[…]
Application Marketplaces
The number of applications available to download on mobile devices has been rising over the past few years and for many of us they are a key part of our lives. We use applications for banking, shopping, games and communication to name a few. However, how secure are these applications that are downloaded onto our[…]
Man in the Middle
A Man in the Middle attack (MITM) is where a malicious actor intercepts internet traffic on a network, to eavesdrop on the data being sent. This could be used to obtain any sensitive information that is sent unencrypted over the network, corrupt the data or simply spy on the victim to determine what websites are[…]
Vulnerable Components: CamScanner
Camscanner is a highly popular mobile application used to convert images to PDF files. A recent investigation into this app by Kaspersky Labs has uncovered a vulnerable component used by the application, designed to carry out malicious activity on the devices of users with the vulnerable version of CamScanner installed. While it is common for[…]
The Digital Spring Clean
If you haven’t already, now is an excellent time for everyone to take the opportunity to have a full on, thorough digital clean-up. This is a painstaking task, but one that will save you enormous amounts of hassle for years to come. Firstly, dig out all of your old devices. Old USB sticks, hard drives,[…]