Skip to content

Blog

Why Prioritizing Password Management and Good Cyber Hygiene is Key to Reducing Risk

According to the National Cyber Security Centre (NCSC) there were 6.4 million reports of suspicious email activity in...

Enterprise Architecture and Its Role Against Security Threats

Last year, Gartner forecast that worldwide spending on security and risk management would soon exceed $150 billion, a...

British Library Cyber-attack Sends Shockwaves Through Business Community

British Library Cyber-attack Sends Shockwaves Through Business Community In a startling turn of events, the British...

Cyber Threat Briefing: An Organization’s Susceptibility to Supply Chain Attacks

In a new report published by the World Economic Forum, entitled Global Cybersecurity Outlook 2022, more than 40% of...

Unseen Threats: Navigating the Landscape of Zero-Click Attacks in Cyberspace

Unseen Threats: Navigating the Landscape of Zero-Click Attacks in Cyberspace In our interconnected global landscape...

Cybersecurity Maturity Model Certification (CMMC): What, How, When and Why?

For almost two years now, the US Department of Defense (DOD) has been reviewing a process designed to ensure defense...

Cyber Threat Briefing: Defending Against Ransomware

The past eighteen months have been tumultuous to say the least. As well as struggling with the fallout from a global...

C2 Framework - MuddyC2Go

C2 Framework - MuddyC2Go A C2 Framework (Command and Control) is a set of tools and protocols which allow red teamers...

EleKtra-Leak: Unmasking the Cryptojacking Menace

In the ever-evolving landscape of cybersecurity threats, a new ongoing campaign has emerged, known as the Elektra-Leak....

Ransomware as a service: A successful business model

As Ransomware groups continue to grow, they become increasingly sophisticated and organised, developing help centres...

From Professional Footballer to Cybersecurity Consultant

October is Cybersecurity Awareness Month, which is an initiative led by the Cybersecurity and Infrastructure Security...

Cyber Threat Briefing: Real-World Cyber Threats

Ransomware attacks have been taking up a large proportion of the news headlines, but that doesn’t mean there haven’t...