Blog
- Sohaib Saif
 - March 30, 2023
 
            Executive Summary During the Covid-19 pandemic, TikTok quickly became one of the most popular social media platforms...
          
          
          
          
          
        - Alex Babbage
 - March 3, 2023
 
            Executive Summary An unidentified threat actor was identified by Menlo Labs using Discord to spread an evasive threat...
          
          
          
          
          
        - Cyber Security Associates
 - February 15, 2023
 
            For some years now, geopolitical conflicts have been as much about bits and bytes as they have boots and bullets. The...
          
          
          
          
          
        - Cyber Security Associates
 - February 15, 2023
 
            What is it? WPwnKit, discovered by the Qualys Research Team, is a local privilege escalation vulnerability affecting a...
          
          
          
          
          
        - Thomas Hope
 - January 30, 2023
 
            Executive Summary One of the most important tasks for an attacker using malware to successfully compromise a target, is...
          
          
          
          
          
        - Cyber Security Associates
 - January 17, 2023
 
            Executive Summary Although the ongoing war between Russia and Ukraine is well known since the invasion in February...
          
          
          
          
          
        - Cyber Security Associates
 - December 29, 2022
 
            The Founders of Cyber Security Associates (CSA), Dave Woodfine and James Griffiths recently joined members of BPE and...
          
          
          
          
          
        - Cyber Security Associates
 - December 20, 2022
 
            IASME is bringing in a new question set and marking scheme for 2022. These changes will affect both Cyber Essentials...
          
          
          
          
          
        - Cyber Security Associates
 - December 1, 2022
 
            The cybersecurity landscape is more challenging and complex than ever before. The development of intelligent new...
          
          
          
          
          
        - Cyber Security Associates
 - December 1, 2022
 
            Whether it’s governments, big corporations, or individuals, any organization with an internet connection is a possible...
          
          
          
          
          
        - Cyber Security Associates
 - November 23, 2022
 
            Today’s threat landscape is more sophisticated than ever before, with every business a potential target. Broadly...
          
          
          
          
          
        - Cyber Security Associates
 - November 15, 2022
 
            The UK government’s Department for Digital, Culture, Media and Sport (DCMS) has released its 2022 Cyber Security...
          
          
          
          
          
        - Cyber Security Associates
 - November 8, 2022
 
            Despite ransomware incidents continuing to dominate the cyber-related headlines, there seems to be a misconception...
          
          
          
          
          
        - Cyber Security Associates
 - September 24, 2022
 
            The Cybersecurity and Infrastructure Security Agency (CISA) in the US recently released its annual top routinely...
          
          
          
          
          
        - Cyber Security Associates
 - September 8, 2022
 
            According to Statista, as of 2022, over 60% of all corporate data is stored in the cloud. This is up from just 30% in...
          
          
          
          
          
        - Cyber Security Associates
 - August 16, 2022
 
            No single piece of software is perfect, and vulnerabilities are common; but when you consider that the average cost of...
          
          
          
          
          
        - Cyber Security Associates
 - July 25, 2022
 
            Fraudulent Google Play Store Applications are Infecting Unsuspecting Users with Malware Although many users consider it...
          
          
          
          
          
        - Cyber Security Associates
 - July 4, 2022
 
            The Ongoing Devaluing of Cryptocurrencies and Potential Impact on Cybercrime “All the [businesses] shared a common...
          
          
          
          
          
        - Cyber Security Associates
 - June 17, 2022
 
            Google Chrome users are at risk to a new Emotet malware variant that steals Credit Card details If Google Chrome is...
          
          
          
          
          
        - Cyber Security Associates
 - May 23, 2022
 
            Executive Summary Conti are a ransomware group who have been hitting the headlines in recent months, but you might have...
          
          
          
          
          
        - Cyber Security Associates
 - May 16, 2022
 
            Executive Summary The metaverse has been making headlines recently, with its promises of merging the digital and...
          
          
          
          
          
        