Blog
- Sohaib Saif
- March 30, 2023
Executive Summary During the Covid-19 pandemic, TikTok quickly became one of the most popular social media platforms...
- Alex Babbage
- March 3, 2023
Executive Summary An unidentified threat actor was identified by Menlo Labs using Discord to spread an evasive threat...
- Cyber Security Associates
- February 15, 2023
For some years now, geopolitical conflicts have been as much about bits and bytes as they have boots and bullets. The...
- Cyber Security Associates
- February 15, 2023
What is it? WPwnKit, discovered by the Qualys Research Team, is a local privilege escalation vulnerability affecting a...
- Thomas Hope
- January 30, 2023
Executive Summary One of the most important tasks for an attacker using malware to successfully compromise a target, is...
- Cyber Security Associates
- January 17, 2023
Executive Summary Although the ongoing war between Russia and Ukraine is well known since the invasion in February...
- Cyber Security Associates
- December 29, 2022
The Founders of Cyber Security Associates (CSA), Dave Woodfine and James Griffiths recently joined members of BPE and...
- Cyber Security Associates
- December 20, 2022
IASME is bringing in a new question set and marking scheme for 2022. These changes will affect both Cyber Essentials...
- Cyber Security Associates
- December 1, 2022
The cybersecurity landscape is more challenging and complex than ever before. The development of intelligent new...
- Cyber Security Associates
- December 1, 2022
Whether it’s governments, big corporations, or individuals, any organization with an internet connection is a possible...
- Cyber Security Associates
- November 23, 2022
Today’s threat landscape is more sophisticated than ever before, with every business a potential target. Broadly...
- Cyber Security Associates
- November 15, 2022
The UK government’s Department for Digital, Culture, Media and Sport (DCMS) has released its 2022 Cyber Security...
- Cyber Security Associates
- November 8, 2022
Despite ransomware incidents continuing to dominate the cyber-related headlines, there seems to be a misconception...
- Cyber Security Associates
- September 24, 2022
The Cybersecurity and Infrastructure Security Agency (CISA) in the US recently released its annual top routinely...
- Cyber Security Associates
- September 8, 2022
According to Statista, as of 2022, over 60% of all corporate data is stored in the cloud. This is up from just 30% in...
- Cyber Security Associates
- August 16, 2022
No single piece of software is perfect, and vulnerabilities are common; but when you consider that the average cost of...
- Cyber Security Associates
- July 25, 2022
Fraudulent Google Play Store Applications are Infecting Unsuspecting Users with Malware Although many users consider it...
- Cyber Security Associates
- July 4, 2022
The Ongoing Devaluing of Cryptocurrencies and Potential Impact on Cybercrime “All the [businesses] shared a common...
- Cyber Security Associates
- June 17, 2022
Google Chrome users are at risk to a new Emotet malware variant that steals Credit Card details If Google Chrome is...
- Cyber Security Associates
- May 23, 2022
Executive Summary Conti are a ransomware group who have been hitting the headlines in recent months, but you might have...
- Cyber Security Associates
- May 16, 2022
Executive Summary The metaverse has been making headlines recently, with its promises of merging the digital and...