WannaCry Infection

Is my business vulnerable to WannaCry?

May 19th, 2017 Incident Response, Malware, User Education and Awareness James Gillies

Already being hailed as the largest ransomware outbreak in history, it has been reported by the BBC that over 150 countries have already been infected by the WannaCry ransomware. Allegedly stolen from US intelligence as part of a large collection of leaks, a so-called zero-day vulnerability was weaponised into a strain of ransomware – with the capability to spread without human interaction, a so-called worm….


4 Cyber Threat predictions for 2017

As many predictions including my own in 2016 demonstrated, email as an attack vector is back with a bang as business everywhere were attacked through phishing emails, tricking people into opening malicious links and bogus attachments – often leading directly to a data breach. Spear Phishing targets specific individuals and business units, the recent US election highlighted an example of this. There was also a…

Zero Day Vulnerability

What is a Zero Day attack, and how do I protect my business against them?

Oct 26th, 2016 Malware, Vulnerability Management James Gillies

An example of a zero day vulnerability would be a security weakness in an operating system such as Windows which is unknown to the vendor, in this case Microsoft. During the period of time that a hacker would discover and attempt to exploit that vulnerability, before the vendor becomes aware of the problem and then subsequently plugs up the security hole with a Windows Update…


How risky are Macros to our business?

Oct 5th, 2016 Malware, User Education and Awareness James Gillies

2016 has seen a renewed and sustained level of cyber threats which use email as the attack vector. If you’re not being coerced into clicking a link in a malicious email, then you may be invited to open an attachment, which will almost always require you to run macros or “enable content.” Macros, which appear in Office documents such as Microsoft Word or Excel, are…

Application Whitelisting, friend or foe?

Aug 3rd, 2016 Malware, Secure Configuration James Gillies

Before we go any further, let’s ask another question: Why would we need application whitelisting? Legacy controls such as Anti-Virus have become less effective at stopping the latest threats, user permissions may not be locked down, meaning users can “run anything”. Often companies build systems which must never be changed, or are very seldom updated due to the types of business-critical information they must process;…

cyber-threats ransomware

What are the biggest cyber-threats at the moment?

Apr 6th, 2016 Malware James Gillies

2016 has seen a huge spike in cyber-threats that have now become monetized, no longer merely a nuisance your data is now the low-hanging fruit and target of the criminals. Completely arbitrary and damaging, here’s a couple of examples of the largest cyber-threats to your digital life today.

Gravityscan Badge