Cybersecurity 101

Access Brokers

Access brokers (also known as initial access brokers) are criminal groups who specialize in selling illegitimate access to corporate networks. These groups breach the networks and then sell the access on to ransomware and other cybercriminal groups.

2022-11-01T15:17:45+00:00November 1st, 2022|


A Botnet consists of many bots (short for robots) that contain code to execute repetitive tasks with high frequency.

2022-09-23T21:49:17+00:00July 19th, 2022|


Bruggling is a term derived from the word smuggling and browser that describes a technique for data exfiltration using browser bookmark synchronization. 

2022-09-23T21:49:30+00:00August 2nd, 2022|

Brute Force Attack

A brute force attack is a hacking method that uses trial and error to decode login information, passwords and encryption keys to gain unauthorized access to systems, networks and information.

2022-09-23T21:47:41+00:00September 20th, 2022|


Clickjacking is a malicious technique during which a victim is tricked into clicking on a URL, button or clickable object other than that intended by or perceived by the user. This is done by displaying invisible pages or HTML element, via frames, on top of the page the user sees. The user will continue [...]

2022-09-23T21:50:02+00:00September 21st, 2022|

Consumer Data Right (CDR) Australia

The Australian Government has introduced Consumer Data Right in Australia. Consumer Data Right will give consumers, including individuals and business, a secure way to control which businesses have access to their data.

2022-09-23T21:50:15+00:00July 19th, 2022|

Crypto Ransomware

Among the oldest, and traditionally the most common form of ransomware, crypto ransomware works by finding valuable files on a system and applying encryption to them so they become unusable.

2022-09-23T21:50:29+00:00July 26th, 2022|


Cryptojacking is a type of cybercrime that involves a hacker co-opting a victim’s computing power to generate cryptocurrency on the attacker’s behalf. The motive for these types of attacks is profit, which is usually extremely effective as it is completely hidden from users and difficult to detect. Hackers use this method instead of having [...]

2022-09-23T21:50:42+00:00September 21st, 2022|