Our Blog

Interested in the latest developments in the security world, or just want to get a better understanding of our service lines then this is the place for you.
Secora Consulting’s blog is a mixture of news and developments in the security world and technical breakdowns of our services.
Bookmark this page to stay informed.

Ransomware Attack Affects Over 800 Businesses Worldwide

Kaseya, a Miami-based IT management company faced a brutal ransomware attack last week, affecting the company and hundreds of its clients. The attack broke down security to Kaseya's systems and used their access to spread through their clients' corporate networks. This set off multiple chain reactions that paralysed between 800 and 1,500 businesses worldwide. Those affected by the file…

Secora Consulting - Your CREST Accredited Cyber Security Partner

Since our inception in 2018, we at Secora Consulting have gone from strength to strength. We have not only grown by bringing in highly experienced and driven colleagues, but also by challenging ourselves daily through certifications and personal development.  This has helped us in our quest to be the leading cyber security service provider in Ireland, as such we are delighted to announce that we…

Effectively Manage Risk Within Your Credit Union

Secora Consulting is delighted to be exhibiting at this years CUMA Spring Conference and AGM. We offer a bespoke one-stop security solution for Credit Unions to align to Central Bank's IT Governance and Risk Management requirements. If you wish to find out more about how our tailored framework will assist your credit unions to meet compliance requirements, please drop by our stand. A member of our…

5 Reasons Why You Should Conduct a Cyber Security Risk Assessment

Whether you run a small business or a large multinational organisation, cyber security cannot be ignored. Conducting regular cyber security risk assessments will reduce your organization's likelihood of experiencing a data breach, it will also ensure the steps you are taking to reduce your exposure to a breach are effective. If you haven’t conducted a risk assessment lately, we have five reasons…

Microsoft Update Fixes 58 Security Flaws

On Tuesday 8th December 2020 Microsoft issued its final Patch Tuesday of 2020. This update included fixes for 58 newly discovered security flaws, and spans across 11 products and services in Microsoft's offering. This release includes 9 patches which are Critical, 46 rated as Important and 3 rated Moderate in their severity. The release addresses issues in Microsoft Windows, Edge Browser…

5 Tips for a Safe Black Friday

On the eve of the Black Friday Sales which will predominantly be conducted online this year due to the restrictions in place, we have decided to put together some easy to follow tips to help you shop securely online:   Cyber criminals can clone well known websites to trick consumers into believing they are shopping on a legitimate website. A fake website can appear identical to the real site…

More Zero-Day Vulnerabilities Discovered in Google Chrome

In a recent blog post we discussed that Google had discovered a zero-day vulnerability in their Chrome browser which led to an update being issued for all users. Since then, Google has discovered and patched two more zero-day flaws discovered in the Chrome browser for desktop. These are the fourth and fifth actively exploited vulnerabilities addressed by the search giant in recent weeks. Unlike…

Common Web Application Vulnerabilities - Part 2

In a previous blog, we discussed two severe but very common issues that we frequently encounter when performing web application penetration tests. In this blog, we are going to be continuing this series by examining two further vulnerabilities that could negatively affect your web applications and discuss how you can easily remediate these issues.   Commonly referred to in its acronym form, CSRF…

New Way to Slip Past Firewalls Disclosed

This week, privacy and security researcher Samy Kamkar has disclosed a new hacking technique which allows an attacker to trick Network Address Translation (NAT) devices such as routers / firewalls to provide remote access to services on victim machines not normally accessible via the internet.   Network Address Translation (NAT) is the process where a network device, such as a firewall, remaps an…

Secure your success.

Use a trusted security partner with experienced consultants, who want to ensure your long term success