Skip to content

Article

Emerging phishing threats and mitigations in 2025

If you’ve been defending organisations for more than a few years, phishing used to be straightforward: spray and pray...

vCISO vs Fractional CISO? Which is best for your business?

Introduction to virtual services Businesses today are increasingly turning to virtual services to meet their cyber...

The importance of authorisation controls (Access Control)

Overview Access controls are essential in ensuring that only the authorised users are able to access certain resources....

SQL injections

Overview SQL queries are often used retrieve or update data on a database server, which means that if attackers could...

Post-breach: Navigating security after a cyber attack

The recent cyber attacks on several famous UK brands may have loosened its grip on the headlines, but that does not...

Taking apart a smart doorbell with a hacker mindset - Part 1

Welcome to our journey into the world of smart doorbell security. In this article, we will take you through our thought...

UK retail cyber attacks: Isolated incident or warning for other sectors?

The furore surrounding the recent cyber-attacks in the UK retail sector has attracted a great deal of attention and has...

How does cyber security enhance IT security?

With cyber threats achieving increasing complexity, organisations can no longer rely solely on IT security to protect...

Enhancing your security posture with Compliance Consultancy

Year on year, cyber security continues to be a top priority for business leaders – and it’s plain to see why. As new...

Working from Home? 5 Steps to Secure Your Home Network

Introduction With a large amount of confidential and/or proprietary information residing on and flowing through a...

Cyber Threat Briefing: Implementing Ransomware Controls

In recent months ransomware attacks have undoubtedly picked up pace as well as impact. There have been high-profile...

Cybersecurity’s lights and shadows of e-vote

Electronic voting or e-vote is the process of casting a vote electronically from a computer phone or tablet.

Vulnerability Management Program: What Makes it Good and What Does Success Look Like?

Cybercrime isn’t going anywhere, and its impact continues to have devastating consequences for individuals and...

Why Prioritizing Password Management and Good Cyber Hygiene is Key to Reducing Risk

According to the National Cyber Security Centre (NCSC) there were 6.4 million reports of suspicious email activity in...

British Library Cyber-attack Sends Shockwaves Through Business Community

British Library Cyber-attack Sends Shockwaves Through Business Community In a startling turn of events, the British...

Unseen Threats: Navigating the Landscape of Zero-Click Attacks in Cyberspace

Unseen Threats: Navigating the Landscape of Zero-Click Attacks in Cyberspace In our interconnected global landscape...

C2 Framework - MuddyC2Go

C2 Framework - MuddyC2Go A C2 Framework (Command and Control) is a set of tools and protocols which allow red teamers...

EleKtra-Leak: Unmasking the Cryptojacking Menace

In the ever-evolving landscape of cybersecurity threats, a new ongoing campaign has emerged, known as the Elektra-Leak....