Alexa metrics
Live Chat

Welcome to UKFast, do you have a question? Our hosting experts have the answers.

Chat Now
Sarah UKFast | Account Manager

Smishing: SMS phishing scams explained

25.6.2020 by Laura Valentine

Familiar with phishing? Even if you don’t know the specifics, most of us have experienced it at one point or another – the unexpected email that appears harmless at first but doesn’t seem quite right upon closer inspection. These emails are sent out by cybercriminals and usually contain a link to malware or a malicious attachment which, if downloaded, cause data breaches or steal sensitive information like passwords and card details. You can learn more about email phishing attacks in our blog here or download our handy phishing cheat sheet.   SMS Phishing – what is it?  It’s important to acknowledge…

Intel Vulnerabilities June 2020: What next?

9.6.2020 by Charlotte Nuttall

At 18:00 BST today, Intel® released information on five security advisories detailing 'fixes or workarounds' for the latest vulnerabilities found in Intel products. UKFast’s team has digested this information to answer any questions you may have and to ensure we are…

Strengthen Your Cloud Security in 5 Steps

27.2.2020 by Charlotte Nuttall

Migrating your workloads to the cloud is a process filled with opportunity for business growth. However, whether your business flourishes in the cloud is not just down to what platform you choose or how much you spend, but how much…

4 Lessons from the Travelex Ransomware Attack

5.2.2020 by Charlotte Nuttall

Foreign currency and travel money service Travelex was attacked with ransomware on 31st December 2019. The attack rendered the Travelex website unavailable for the entirety of January 2020 and had a significant impact on the company’s wider operations – with…

Most Common Cyber-Attacks of 2019 Explained

8.1.2020 by Charlotte Nuttall

Over the course of 2019, UKFast’s Threat Monitoring service detected and responded to more than 33 million cyber-attacks across our clients’ networks. Using this wealth of data, we were able to identify the four most common cyber-attack vectors used by…

Intel Vulnerability: Intel’s ‘New Zombieload Flaw’

12.11.2019 by Charlotte Nuttall

On 12th November 2019, Intel® disclosed a potential security vulnerability which affects a number of Intel® Processors. The hardware flaw affects server memory and may allow for unexpected reloads of a device (DoS attack) if unmitigated. What is the new…

The 7 Worst Hacks and Breaches of All Time

5.11.2019 by Charlotte Nuttall

From global breaches exposing the personal data of millions, to employee slip ups jeopardising entire business networks, hacks and breaches have become a staple of our lives. But what are the worst hacks and breaches of all time? Well, we…

White Hat Hackers: The inside story

30.10.2019 by Charlotte Nuttall

Often stereotyped as dubious, hooded characters hunched over keyboards in dank basements, hackers historically have had a pretty bad rep. But with every good villain comes a hero. In this case, the white hat hackers using their skills as a…

Vulnerability Scanning vs Penetration Testing

23.10.2019 by Charlotte Nuttall

This Vulnerability Scanning vs Penetration Testing guest blog is authored by Holly Williams, Technical Director of cybersecurity firm Secarma. * I occasionally see the terms vulnerability assessment and penetration test used interchangeably, or even phrases such as ‘automated penetration test’ thrown…

Automated Cyber-Attacks Are Coming For Us

17.10.2019 by Charlotte Nuttall

It’s no secret that cyber-attacks are becoming more automated and intelligent by the day. With the help of AI and machine learning (ML), hackers are able to act faster and more efficiently than ever. But what is this new wave…