THREATS
 
In the days of yore, an IMSI catcher was an extremely expensive unit to buy, and the training needed to use it was limited to a select few. This is no longer the case, since the knowledge needed to use IMSI catchers is now in the public domain, and the skills for creating one are more generally (...)
THREATS
 
Over the past week, various articles have been published about the Industroyer malware. The technical aspects have been laid out clear and plain for all to understand, albeit mostly picked up by the cybersecurity community itself. But how alarming is Industroyer really?
OPINIONS
 
Using cloud, whether it’s a stand-alone solution, or is integrated into the existing IT infrastructure, creates complexity, which needs to be handled by the procedures that are already in place at the company.
OPINIONS
 
SCADA systems have been running offline for years, but those days are long gone. Now, they often rely on connectivity to the Internet, but because they have been running offline for decades, the security of these systems is not ready for online exposure. So how do we secure SCADA systems?
OPINIONS
 
Outsourcing security to providers is a necessity for many organisations - but there are certain things that you need to keep in mind when doing so.
OPINIONS
 
Governments have a legitimate need to be able to access information in cases where a court order has been issued for accessing it. But calls for a general weakening of encryption will result in an alarming reduction in the security needs for not only businesses, but also the general public.
THREATS
 
The group that originally leaked the NSA tools in April, “the Shadow Brokers”, are promising to dump more exploits, which will be available through a paid subscription service starting in June. The subscription will cost $ 21,000 per month, and the group says that the monthly dumps are for " (...)
EVENT
 
The evolution of the SOC: when outbreaks like WannaCry are commonplace, it is time to move from traditional MSSP to a more comprehensive approach
EVENT
 
How far can an intruder get if you fall victim to a phishing attack, and how can you protect yourself? 
WAR STORIES
 
Regardless of the size, scope, geography or sector of your organisation, there are common elements that should be considered when it comes to cyber security due diligence during the M&A process.
EVENT
 
To celebrate our move to our shiny new office, we are having an open house on Thursday, 9th of February. To mark the occasion, NCC Group CEO Rob Cotton and FortConsult founder Ulf Munkedal will accompany Principal Security Consultant Neal Hindocha and Head of Security Strategy Jan Skovgren on stage.
OPINIONS
 
January is a time of rethinking and contemplation: how can we improve, and which new challenges will the year bring? FortConsult’s focus this year is to help our clients rethink the way they traditionally approach the monumental challenge that is cyber security.
EVENT
 
It is becoming increasingly challenging for companies to navigate the current threat environment, with numerous and varied threats creating an overwhelming amount of areas to focus cyber defence operations on. To help businesses on the right track, FortConsult is hosting a free webinar on how to (...)
NEWS
 
Presenting at Kiwicon in New Zealand, FortConsult hacker Michele Orru, also known as ‘AntiSnatchOr’ in some circles, showcased and released his latest phishing kit.
WAR STORIES
 
Is your organisation fully prepared for malicious attacks from both motivated external attackers and internal threat actors? As the threat landscape continues to evolve it is vital that organisations understand where the threats are and how they can protect and mitigate the risk.