Skip to content

Blog

Microsoft announces solution to detect suspicious processes running on hidden desktops

Overview With remote desktop protocol (RDP) compromises on the rise, Microsoft Defender for Endpoint has introduced a...

CSA are members of the Armed Forces Covenant

We commit to uphold the Armed Forces Covenant and support the Armed Forces Community. We recognise the contribution...

Cyber Siege: The NHS Data Breach and Its Ripple Effects on Patient Care

Once more, we are in the midst of a cyber ransomware attack. Today's target is Synnovis, an NHS blood testing provider...

Cyber Threat Briefing: Implementing Ransomware Controls

In recent months ransomware attacks have undoubtedly picked up pace as well as impact. There have been high-profile...

Cybersecurity’s lights and shadows of e-vote

Electronic voting or e-vote is the process of casting a vote electronically from a computer phone or tablet.

Direct Memory Access Attacks: An easy way to hack into memory, bypass logon screens and ignore device encryption

Have you ever come across a laptop, server or desktop computer that has Full Device Encryption (FDE) and protected by a...

Threat Hunting Report: GoldPickaxe

Executive Summary The purpose of this report is to document the current form and methodologies used by the GoldFactory...

The Vital Role of Incident Response Testing in Organizations’ Security

Do you take your security seriously? In this blog, you’ll learn why incident response testing is vital to your...

The Benefits of Combining your ISMS Program with a Penetration Testing Cycle

What is an ISMS program? The NCSC defines penetration testing as “A method for gaining assurance in the security of an...

Vulnerability Management Program: What Makes it Good and What Does Success Look Like?

Cybercrime isn’t going anywhere, and its impact continues to have devastating consequences for individuals and...

Threat Hunting Report: Volt Typhoon

Executive Summary The purpose of this report is to document the current form and methodologies used by the Volt Typhoon...

PCI DSS v4.0 – Where are we now?

The long-awaited latest iteration of the Payment Card Industry (PCI) Data Security Standard (DSS) is here! What is PCI...

FluidOne and its Cyber Security Associates division (CSA) acquire SureCloud Cyber Services

London, UK – 13th March 2024 - FluidOne, the market-leading provider of Connected Cloud Solutions, announced today that...

Why Prioritizing Password Management and Good Cyber Hygiene is Key to Reducing Risk

According to the National Cyber Security Centre (NCSC) there were 6.4 million reports of suspicious email activity in...

Enterprise Architecture and Its Role Against Security Threats

Last year, Gartner forecast that worldwide spending on security and risk management would soon exceed $150 billion, a...

British Library Cyber-attack Sends Shockwaves Through Business Community

British Library Cyber-attack Sends Shockwaves Through Business Community In a startling turn of events, the British...

Cyber Threat Briefing: An Organization’s Susceptibility to Supply Chain Attacks

In a new report published by the World Economic Forum, entitled Global Cybersecurity Outlook 2022, more than 40% of...

Unseen Threats: Navigating the Landscape of Zero-Click Attacks in Cyberspace

Unseen Threats: Navigating the Landscape of Zero-Click Attacks in Cyberspace In our interconnected global landscape...

Cybersecurity Maturity Model Certification (CMMC): What, How, When and Why?

For almost two years now, the US Department of Defense (DOD) has been reviewing a process designed to ensure defense...

Cyber Threat Briefing: Defending Against Ransomware

The past eighteen months have been tumultuous to say the least. As well as struggling with the fallout from a global...

C2 Framework - MuddyC2Go

C2 Framework - MuddyC2Go A C2 Framework (Command and Control) is a set of tools and protocols which allow red teamers...