Welcome to the CyberContego blog
Cyber News Roundup – Episode 5
Welcome to episode 5 of the Cyber News Roundup. This week’s episode features three articles covering a very convincing gift card scam, a new malware-as-a-service campaign and phishing messages on LinkedIn targeting finance executives. If you’d like to be informed when we drop new episodes please follow our company page on LinkedIn. If you’d like…
Cyber News Roundup – Episode 4
Welcome to episode 4 of the Cyber News Roundup. This week’s episode features three articles covering a likely alliance between three notorious hacking groups, the use of AI-powered platforms being used to deliver fake captchas, and a consumer sentiment survey about the effects on customer trust after a breach. If you’d like to be informed…
Cyber News Roundup – Episode 3
Welcome to episode 3 of the Cyber News Roundup. This week’s episode features three articles covering the current cyberattack affecting several major European airports, the sixth zero-day flaw of this year affecting Google Chrome and the dangers of storing passwords in plaintext files. If you’d like to be informed when we drop new episodes please…
Cyber News Roundup – Episode 2
Welcome to episode 2 of the Cyber News Roundup. This week’s episode features three articles covering a breach at Plex, the exploitation of legitimate RMM tools and the Windows 10 EOL. If you’d like to be informed when we drop new episodes please follow our company page on LinkedIn or if you’d like to learn…
Cyber News Roundup – Episode 1
Welcome to this week’s Cyber News Roundup. In this weekly series we discuss some cyber news stories that caught our eye over the past week or so. This week’s episode features spear phishing, a newly discovered WhatsApp bug and a previously unknown ransomware variant called Obscura. If you’d like to be informed when we drop…
Why cybersecurity is like buying your meat (seriously)
Beef or chicken? A recent study found that over 80% of Irish consumers buy their meat from supermarket chains. The remaining 20% or so—myself included—choose to shop at their local butcher. Sure, I pay a little extra, but that few euro is well worth it for the quality, variety, and personal service. My butcher knows…
Huntress 2025 Cyber Threat Report
Introduction Huntress recently released its 2025 Cyber Threat Report—a comprehensive look back at 2024, highlighting the tactics, behaviors, and trends they observed while safeguarding millions of devices and users worldwide. Below, I’ve summarised some of the key insights from the report. You can also view or download the full version. Let’s begin with a line…
AdminDroid partnership announcement
We’re excited to announce our partnership with AdminDroid. AdminDroid’s powerful Office 365 management tools and reporting capabilities provide us with invaluable insights into activity within our clients’ Microsoft 365 environments. This enables us to detect suspicious activity and identify anomalous behavior more effectively. The platform offers over 1,500 detailed reports and 15+ interactive dashboards across…
Vulnerability Assessment vs Penetration Testing
Introduction This post delves into two crucial cybersecurity techniques: vulnerability assessments and penetration testing. At CyberContego, clients often turn to us for advice on these topics. To provide clarity, we’ve created this blog to highlight the key aspects of each approach and share insights from our work with clients. What is vulnerability assessment? A vulnerability…
Why your SME needs to invest in cybersecurity defences
Introduction Investing in cybersecurity defences is crucial for small and medium-sized enterprises (SMEs) due to several compelling reasons. As cyber threats continue to evolve, SMEs are increasingly vulnerable, often lacking the resources and awareness necessary to protect themselves effectively. Here are the key reasons why SMEs should prioritise cybersecurity: Increased Vulnerability 1. Target for Cybercriminals: Approximately 43% of…
Why would an MSP outsource the provision of cybersecurity services?
Why would an MSP outsource the provision of cybersecurity services? There are several compelling reasons why an MSP might choose to outsource the provision of cybersecurity services: Specialisation and Expertise MSPs often focus on general IT services and infrastructure management. Cybersecurity, however, is a highly specialised and rapidly evolving field that requires dedicated expertise. By…
The Scariest Cybersecurity Threats of 2024
This week we are revealing the top cybersecurity threats in 2024. We warned you, it’s spooky season and cybersecurity awareness season, so prepare for a fright! As technology continues to advance, the risk of cyberattacks also increases. Not only is the number of cyberattacks growing, but these incidents are becoming more sophisticated and dangerous. Many…







