Every day a new threat is manufactured, and every day an innovative counter to that threat is created. Our industry moves quickly, and those that can't or won't keep up are fast left behind in high-risk territory.
At Xiph Cyber, our commitment to protecting your privacy and the sovereignty of your data means we invest a lot of time and effort in maintaining up-to-the-minute awareness of the shifts in our industry. You'll find the latest news and our own blogs right here.
Social engineering in cyber security: The art of manipulation and defence
Sep 18, 2023
In today's digital world, the battle for security extends beyond firewalls and encryption protocols. Social engineering continues to emerge as the biggest threat to businesses and individuals. In fact, social engineering attacks account for about 25% of data breaches in small and medium-sized enterprises (SMEs), according to the OAIC.
Using open-source intelligence (OSINT) in cyber security
Sep 04, 2023
Open-source intelligence (OSINT) has emerged as a vital tool for cyber security. It’s used by businesses, governments, and other organisations alike to gather cyber intelligence from publicly available and legally accessible sources.
The rise of automotive hacking & the vulnerabilities of modern vehicles
Aug 21, 2023
Modern and electric vehicles (EVs) are now sophisticated computerised systems on wheels, and while their smart features make driving more convenient (and sometimes fun), they’re also introducing more cyber threats. Cars with connected systems have more control vulnerabilities and are more susceptible to cyber attacks — or automotive hacking.
10 ways to use AI to bolster your cyber security
Aug 07, 2023
Traditional solutions may only sometimes suffice in the ever-evolving landscape of cyber security. Organisations can use the synergy between artificial intelligence (AI) and human expertise to protect their digital assets from cyber threats and malicious actors. Here are ten ways to use AI to bolster your cyber security.
Cloud vulnerabilities to be aware of
Jul 19, 2023
Cloud computing offers endless opportunities and competitive advantages for scalability, IT performance and data security. However, there are known cloud computing vulnerabilities to be aware of. Cloud computing system vulnerabilities can be exploited by cyber criminals and lead to data breaches, unauthorised access to networks, and potential financial losses.
Indicators of compromise (IOCs) guide
Jul 12, 2023
Suspicious network activity, malware attacks and cyber breaches typically leave digital red flags – or indicators of compromise (IOCs) − that can alert security teams of these security threats and help better coordinate incident response and disaster recovery.
Crypto crackdown – Why are banks banning crypto?
Jul 05, 2023
Banks are slowly banning decentralised cryptocurrencies – is it to protect customers from scam risks or to make way for their own centralised digital currencies?
Is WhatsApp safe? Main security issues
Jun 28, 2023
WhatsApp is trusted by over 2 billion active users and is the top encrypted cross-platform messaging app in the world by market share. The Meta-owned service provides free messaging and end-to-end encryption on all communications, but how safe is it really?
What is spyware & how to protect yourself
Jun 21, 2023
It may sound like a gadget you’d hear about in a spy movie, but spyware is very real and malicious. You never see it coming and may not even be aware of it (until it’s too late), plus spyware can be very hard to get rid of.
Sandbox security defined
Jun 14, 2023
Anyone who’s ever been to a beach will know − sand gets everywhere. It’s the same deal when you code and use programs and web applications that can interfere with the rest of your operating system. Pairing programs or having various developers write code can get messy quickly, putting your operating system and devices at risk. Add potentially risky programs, misconfigured files, or code and things get downright dirty. That’s where sandboxing comes in.