Alexa metrics
Live Chat

Welcome to UKFast, do you have a question? Our hosting experts have the answers.

Chat Now
Sarah UKFast | Account Manager

Get the latest updates, insight, top tips and expert advice  in the cybersecurity world. Working with our sister cybersecurity company Secarma, UKFast works to innovate super-secure products and services to protect your business. Read our range of security blogs, from our ‘top tips to fight the ransomware threat’ to ‘what is SIEM software?’.

Windows Vulnerabilities Explained: January 2020

15.1.2020 by Charlotte Greene

On 14th January 2020,  Microsoft released a patch for 49 vulnerabilities affecting Windows Server 2016, Server 2019 and Windows 10. Of these, eight were marked as critical including CVE-2020-0603, CVE-2020-0605, CVE-2020-0606, CVE-2020-0646 CVE-2020-0609, CVE-2020-0610, CVE-2020-0611 and CVE-2020-0640. Window vulnerabilities explained: CVE-2020-0601 This vulnerability impacts the way Windows CryptoAPI validates Elliptical Curve Cryptography certificates.  An attacker could exploit the vulnerability to spoof a code-signed certificate to sign a file or executable code, making it appear to be from a trusted source.  Some examples of where validation of trust would be impacted are HTTPS connections, signed files and emails, and signed executable…

Most Common Cyber-Attacks of 2019 Explained

8.1.2020 by Charlotte Greene

Over the course of 2019, UKFast’s Threat Monitoring service detected and responded to more than 33 million cyber-attacks across our clients’ networks. Using this wealth of data, we were able to identify the four most common cyber-attack vectors used by…

Intel Vulnerability: Intel’s ‘New Zombieload Flaw’

12.11.2019 by Charlotte Greene

On 12th November 2019, Intel® disclosed a potential security vulnerability which affects a number of Intel® Processors. The hardware flaw affects server memory and may allow for unexpected reloads of a device (DoS attack) if unmitigated. What is the new…

The 7 Worst Hacks and Breaches of All Time

5.11.2019 by Charlotte Greene

From global breaches exposing the personal data of millions, to employee slip ups jeopardising entire business networks, hacks and breaches have become a staple of our lives. But what are the worst hacks and breaches of all time? Well, we…

White Hat Hackers: The inside story

30.10.2019 by Charlotte Greene

Often stereotyped as dubious, hooded characters hunched over keyboards in dank basements, hackers historically have had a pretty bad rep. But with every good villain comes a hero. In this case, the white hat hackers using their skills as a…

Vulnerability Scanning vs Penetration Testing

23.10.2019 by Charlotte Greene

This Vulnerability Scanning vs Penetration Testing guest blog is authored by Holly Williams, Technical Director of cybersecurity firm Secarma. * I occasionally see the terms vulnerability assessment and penetration test used interchangeably, or even phrases such as ‘automated penetration test’ thrown…

Automated Cyber-Attacks Are Coming For Us

17.10.2019 by Charlotte Greene

It’s no secret that cyber-attacks are becoming more automated and intelligent by the day. With the help of AI and machine learning (ML), hackers are able to act faster and more efficiently than ever. But what is this new wave…

Upgrade recommended as Linux sudo vulnerability is discovered

16.10.2019 by Charlotte Greene

An Apple security researcher has discovered a vulnerability in the Linux sudo command – the main command that allows users to run tasks - that could allow unprivileged users to execute commands as root. Before you panic, it’s important to…

What is the zero-trust security model?

9.10.2019 by Charlotte Greene

We’re always looking for ways to make our IT safer and our networks more secure. In this blog, we explore the zero-trust model and why businesses are adopting this to safeguard their networks from attackers and avoid data breaches. What…

Multi-Factor Authentication: Why and How to Use It

8.10.2019 by Charlotte Greene

Multi-factor authentication (MFA) is becoming commonplace within modern workplaces. With a significant rise in the volume and variation of cyber-threats over the past decade or so, and plenty of high-profile security scandals more recently, it’s clear that cybersecurity must be…