Posts about Blog

The Anatomy of a Cyber Attack: A Walk-Through Detection Case Study

The Anatomy of a Cyber Attack: A Walk-Through Detection Case Study

A cyber-attack happens, on average, every 39 seconds and, according to IBM Security’s Cost of a Data Breach Report for 2022, 83% of businesses have seen more than one breach. With 42 million records, including names, email addresses, passport details, and sensitive healthcare and financial information exposed between March 2021 and February 2022, the situation shows no signs of improvement. Alarmingly, the Cybersecurity and Infrastructure...

The Anatomy of a Cyber Attack: A Walk-Through Detection Case Study

Cyberseer’s Response to Targeted Password Spraying Attacks

Well-established cyber threats pose significant risks to businesses across all sectors. Our recent...

The Anatomy of a Cyber Attack: A Walk-Through Detection Case Study

Russian Intrusion Unveiled Detecting Anomalous User Logins on OneDrive

Introduction: At Cyberseer, we pride ourselves on staying ahead of the curve when it comes to...

The Anatomy of a Cyber Attack: A Walk-Through Detection Case Study

Cybersecurity: Who’s the Weakest Link in your Business?

Often threats to an organisation’s cybersecurity are rather closer to home than we’d like to...

The Anatomy of a Cyber Attack: A Walk-Through Detection Case Study

Navigating the Evolving Threat of Ransomware: Trends and Strategies for 2024

Ransomware continues to cast a long shadow over the digital security of businesses around the...

The Anatomy of a Cyber Attack: A Walk-Through Detection Case Study

Navigating the Pitfalls of Generative AI

Generative AI has become one of the key technological innovations of the past few years, capturing...

The Anatomy of a Cyber Attack: A Walk-Through Detection Case Study

Collaborative Defence: Integrating Microsoft Defender with other Security Tools

Following on from our blog: ‘From Phishing to Worms: A Deep Dive into Microsoft Defender’s...

The Anatomy of a Cyber Attack: A Walk-Through Detection Case Study

From Phishing to Worms: A Deep Dive into Microsoft Defender’s Detection

In the rapidly evolving cybersecurity landscape, having robust investigative capabilities is...

The Anatomy of a Cyber Attack: A Walk-Through Detection Case Study

Brute Force Attack of an Executive User

Cyberseer deploys advanced threat detection solutions as part of its managed security services...

The Anatomy of a Cyber Attack: A Walk-Through Detection Case Study

Employee Data Theft

After a quick browse of cybersecurity headlines, any reader would quickly see the sheer volume of...

Sign up to receive Cyberseer blogs directly to your inbox: