Bank closure spark phishing campaign

Ulster Bank and KBC have enabled cybercriminals to launch a targeted phishing campaign in recent months (Source). Phishing campaigns involve the mass sending of emails that appear to be from a reputable source however, upon closer inspection you will notice that the emails are impersonating that source/site/company. They are used by cybercriminals in an attempt to have people willingly give up the details to sensitive accounts such as login details or bank details.  

Case Study: HSE Conti Ransomware

What Happened:

In the early hours of May 14th, 2021, hackers began locking up 10’s of thousands of the HSE’s computers and servers, demanding a €20 million ransom (source) in order to unlock them. What’s worse, the malicious actors threatened to release all patient personal health details onto the Dark Web if the ransom demands were not met. In response, the HSE contracted the Irish Defence Forces, the National Cyber Security Centre (NCSC) and critical third parties to aid and provide structure to the recovery of Ireland’s public healthcare system (source). Taking 3 months and a projected €100million (source), this is the story of Ireland’s most damaging cyberattack in history.  

The Importance of Patch Management

That’s the approximate number of organizations hacked due to the Microsoft Exchange Server exploit, according to KrebsOnSecurity, including small business, banks, hospitals, government organizations and even Multinational Corporations. The vulnerability enabled hackers to gain access to emails, unencrypted passwords and entire servers leaving organizations across the world searching for ways to take back control of their (and their customers’) data. This could have been preventing using a simple tool - patching.


Folow us


Folow us



191 Colab,
Port Road, 
Co. Donegal

+353 7491 17034


3-5 Commerical Court
Co. Antrim
Northern Ireland

+44 2896 205140