Skip to the content
Cloudwyse

Cloudwyse

Shaping the future

Menu
  • Home
  • Services
  • Contact Us
  • Blog

Unveiling Evilginx2: Understanding the Threat of Advanced Phishing Attacks

By Tom Kitching

In recent months, cybersecurity researchers have uncovered a sophisticated tool known as Evilginx2, which poses a significant threat to individuals, businesses, and organizations worldwide. Evilginx2 represents an evolution of traditional phishing techniques, leveraging advanced tactics…

Phishing in Troubled Waters: Navigating the Surge in COVID-19 Related Scams

By Tom Kitching

As the world continues to grapple with the ongoing COVID-19 pandemic, cybercriminals have seized upon the uncertainty and fear surrounding the crisis to launch a wave of phishing attacks targeting individuals, businesses, and organizations worldwide.…

Cryptojacking on the Rise: Understanding the Threat to Your Resources

By Tom Kitching

In recent months, there has been a noticeable uptick in cryptojacking attacks targeting individuals, businesses, and organizations worldwide. Cryptojacking, also known as malicious cryptocurrency mining, involves the unauthorized use of computing resources to mine cryptocurrencies…

The Ever-Evolving Threat Landscape: Insights from the SolarWinds Supply Chain Attack

By Tom Kitching

The SolarWinds supply chain attack, discovered in late 2020, continues to reverberate across the cybersecurity landscape, serving as a stark reminder of the evolving threat landscape and the challenges posed by sophisticated cyber adversaries. Initially…

Ransomware Resurgence: The Rise of Conti and BlackCat Threat Groups

By Tom Kitching

In recent months, the cybersecurity landscape has witnessed a resurgence in ransomware attacks, with threat groups such as Conti and BlackCat orchestrating sophisticated campaigns targeting organizations worldwide. These attacks have underscored the evolving tactics and…

Staying Vigilant: Understanding the Impact of the Log4j Vulnerability

By Tom Kitching

In December 2022, cybersecurity experts uncovered a critical vulnerability in Apache Log4j, a widely used Java-based logging library. Dubbed Log4Shell or Log4j vulnerability (CVE-2021-44228), this flaw allowed remote code execution, potentially enabling threat actors to…

Posts pagination

Previous 1 2 3 … 9 Next

Recent posts

Critical Cisco IOS XR Exploit: Protecting Network Infrastructures

September 26, 2024 0

Generative AI Phishing Scams: How Cybercriminals Are Using AI to Outsmart Users

September 4, 2024 0

Rise of SIM Swapping Attacks: Targeting Cryptocurrency Holders

August 26, 2024 0

Importing certificates from 123-reg.co.uk for use in IIS (applies to many cert providers)

July 4, 2024 0

Search

Follow Us

Follow Us

Facebook-f Twitter Linkedin

Head Office Address

Cloudwyse Ltd
148 Rose Bowl,
Portland Crescent,
Leeds,
LS1 3HB

Contact

UK: 0113 4508608

USA: (832) 843-0608

Email: info@cloudwyse.co.uk

Company Information

Company Number:

11357935

VAT Number:

GB 323 4853 10

Created with Futurio WordPress Theme