Blogs & Media

Xiph Cyber brings you the latest industry news and views.

Every day a new threat is manufactured, and every day an innovative counter to that threat is created. Our industry moves quickly, and those that can't or won't keep up are fast left behind in high-risk territory.

At Xiph Cyber, our commitment to protecting your privacy and the sovereignty of your data means we invest a lot of time and effort in maintaining up-to-the-minute awareness of the shifts in our industry. You'll find the latest news and our own blogs right here.

Browse categories: Case Studies , Security

Unmasking sniffing attacks: How to protect your network

Oct 02, 2023

In the digital world, where data flows seamlessly between devices and networks, sniffing attacks are a particularly insidious form of intrusion. Understanding the anatomy of a sniffing attack is paramount in fortifying your network's defences.

Social engineering in cyber security: The art of manipulation and defence

Sep 18, 2023

In today's digital world, the battle for security extends beyond firewalls and encryption protocols. Social engineering continues to emerge as the biggest threat to businesses and individuals. In fact, social engineering attacks account for about 25% of data breaches in small and medium-sized enterprises (SMEs), according to the OAIC.

Using open-source intelligence (OSINT) in cyber security

Sep 04, 2023

Open-source intelligence (OSINT) has emerged as a vital tool for cyber security. It’s used by businesses, governments, and other organisations alike to gather cyber intelligence from publicly available and legally accessible sources.

The rise of automotive hacking & the vulnerabilities of modern vehicles

Aug 21, 2023

Modern and electric vehicles (EVs) are now sophisticated computerised systems on wheels, and while their smart features make driving more convenient (and sometimes fun), they’re also introducing more cyber threats. Cars with connected systems have more control vulnerabilities and are more susceptible to cyber attacks — or automotive hacking.

10 ways to use AI to bolster your cyber security

Aug 07, 2023

Traditional solutions may only sometimes suffice in the ever-evolving landscape of cyber security. Organisations can use the synergy between artificial intelligence (AI) and human expertise to protect their digital assets from cyber threats and malicious actors. Here are ten ways to use AI to bolster your cyber security.

Cloud vulnerabilities to be aware of

Jul 19, 2023

Cloud computing offers endless opportunities and competitive advantages for scalability, IT performance and data security. However, there are known cloud computing vulnerabilities to be aware of. Cloud computing system vulnerabilities can be exploited by cyber criminals and lead to data breaches, unauthorised access to networks, and potential financial losses.

Indicators of compromise (IOCs) guide

Jul 12, 2023

Suspicious network activity, malware attacks and cyber breaches typically leave digital red flags – or indicators of compromise (IOCs) − that can alert security teams of these security threats and help better coordinate incident response and disaster recovery.

Crypto crackdown – Why are banks banning crypto?

Jul 05, 2023

Banks are slowly banning decentralised cryptocurrencies – is it to protect customers from scam risks or to make way for their own centralised digital currencies?

Is WhatsApp safe? Main security issues

Jun 28, 2023

WhatsApp is trusted by over 2 billion active users and is the top encrypted cross-platform messaging app in the world by market share. The Meta-owned service provides free messaging and end-to-end encryption on all communications, but how safe is it really?

What is spyware & how to protect yourself

Jun 21, 2023

It may sound like a gadget you’d hear about in a spy movie, but spyware is very real and malicious.  You never see it coming and may not even be aware of it (until it’s too late), plus spyware can be very hard to get rid of.