Alexa metrics
Live Chat

Welcome to UKFast, do you have a question? Our hosting experts have the answers.

Chat Now
Sarah UKFast | Account Manager

Get the latest updates, insight, top tips and expert advice  in the cybersecurity world. Working with our sister cybersecurity company Secarma, UKFast works to innovate super-secure products and services to protect your business. Read our range of security blogs, from our ‘top tips to fight the ransomware threat’ to ‘what is SIEM software?’.

Intel Vulnerability: Intel’s ‘New Zombieload Flaw’

12.11.2019 by Charlotte Greene

On 12th November 2019, Intel® disclosed a potential security vulnerability which affects a number of Intel® Processors. The hardware flaw affects server memory and may allow for unexpected reloads of a device (DoS attack) if unmitigated. What is the new vulnerability? Reported as a new variant of the Zombieload attack discovered earlier this year, this new flaw is said to target Intel’s latest family of chips, Cascade Lake. CVE-2018-12207 is a vulnerability in the way Intel® CPUs handle memory. If exploited by an authenticated user, it can cause your server or hardware node to unexpectedly reboot, which effectively would take that…

The 7 Worst Hacks and Breaches of All Time

5.11.2019 by Charlotte Greene

From global breaches exposing the personal data of millions, to employee slip ups jeopardising entire business networks, hacks and breaches have become a staple of our lives. But what are the worst hacks and breaches of all time? Well, we…

White Hat Hackers: The inside story

30.10.2019 by Charlotte Greene

Often stereotyped as dubious, hooded characters hunched over keyboards in dank basements, hackers historically have had a pretty bad rep. But with every good villain comes a hero. In this case, the white hat hackers using their skills as a…

Vulnerability Scanning vs Penetration Testing

23.10.2019 by Charlotte Greene

This Vulnerability Scanning vs Penetration Testing guest blog is authored by Holly Williams, Technical Director of cybersecurity firm Secarma. * I occasionally see the terms vulnerability assessment and penetration test used interchangeably, or even phrases such as ‘automated penetration test’ thrown…

Automated Cyber-Attacks Are Coming For Us

17.10.2019 by Charlotte Greene

It’s no secret that cyber-attacks are becoming more automated and intelligent by the day. With the help of AI and machine learning (ML), hackers are able to act faster and more efficiently than ever. But what is this new wave…

Upgrade recommended as Linux sudo vulnerability is discovered

16.10.2019 by Charlotte Greene

An Apple security researcher has discovered a vulnerability in the Linux sudo command – the main command that allows users to run tasks - that could allow unprivileged users to execute commands as root. Before you panic, it’s important to…

What is the zero-trust security model?

9.10.2019 by Charlotte Greene

We’re always looking for ways to make our IT safer and our networks more secure. In this blog, we explore the zero-trust model and why businesses are adopting this to safeguard their networks from attackers and avoid data breaches. What…

Multi-Factor Authentication: Why and How to Use It

8.10.2019 by Charlotte Greene

Multi-factor authentication (MFA) is becoming commonplace within modern workplaces. With a significant rise in the volume and variation of cyber-threats over the past decade or so, and plenty of high-profile security scandals more recently, it’s clear that cybersecurity must be…

Web Application Firewalls: What You Should Know

3.10.2019 by Charlotte Greene

Using a web application firewall (WAF) has become a staple for any organisation conscious about its cybersecurity. And for good reason. The abundance of insecure coding practices creates a wealth of vulnerabilities in the code of web-based apps. Combine this…

How to Defend Against the Most Common Cyber-Threats

2.10.2019 by Charlotte Greene

There are so many different cyber-threats out there. From phishing to DDoS, malware to web-based attacks. But what are the most common cyber-threats you should be focussing on? And what are the most effective methods of protection? The truth is…