Skip to content

Article

Working from Home? 5 Steps to Secure Your Home Network

Introduction With a large amount of confidential and/or proprietary information residing on and flowing through a...

Cyber Threat Briefing: Implementing Ransomware Controls

In recent months ransomware attacks have undoubtedly picked up pace as well as impact. There have been high-profile...

Cybersecurity’s lights and shadows of e-vote

Electronic voting or e-vote is the process of casting a vote electronically from a computer phone or tablet.

Vulnerability Management Program: What Makes it Good and What Does Success Look Like?

Cybercrime isn’t going anywhere, and its impact continues to have devastating consequences for individuals and...

Why Prioritizing Password Management and Good Cyber Hygiene is Key to Reducing Risk

According to the National Cyber Security Centre (NCSC) there were 6.4 million reports of suspicious email activity in...

British Library Cyber-attack Sends Shockwaves Through Business Community

British Library Cyber-attack Sends Shockwaves Through Business Community In a startling turn of events, the British...

Unseen Threats: Navigating the Landscape of Zero-Click Attacks in Cyberspace

Unseen Threats: Navigating the Landscape of Zero-Click Attacks in Cyberspace In our interconnected global landscape...

C2 Framework - MuddyC2Go

C2 Framework - MuddyC2Go A C2 Framework (Command and Control) is a set of tools and protocols which allow red teamers...

EleKtra-Leak: Unmasking the Cryptojacking Menace

In the ever-evolving landscape of cybersecurity threats, a new ongoing campaign has emerged, known as the Elektra-Leak....

Ransomware as a service: A successful business model

As Ransomware groups continue to grow, they become increasingly sophisticated and organised, developing help centres...

From Professional Footballer to Cybersecurity Consultant

October is Cybersecurity Awareness Month, which is an initiative led by the Cybersecurity and Infrastructure Security...

QR Phishing: The Scam That's Sneaking Up Behind You

QR codes, also known as Quick Response codes, have become increasingly popular in recent years. They are a convenient...

Cyber Threat Briefing: How secure is your wearable tech?

It’s no secret that wearable technology, such as smartwatches and fitness trackers, are increasingly becoming a key...

’Hit and Run’ Electric cars and the chips susceptible to hardware hacks

When we park or store our cars overnight, we often give thought to the valuable items, careful not to leave them in...

5G, the Next Generation of Networking?

With the increased commonplace of 5G technology around the country, interesting and unique challenges have come...

Battling MFA Fatigue: A Rising Challenge in the Current Threat Landscape

Imagine that after a hard day’s work, you suddenly receive a multitude of multifactor authentication (MFA) prompts...

Common PCI DSS Mistakes

When it comes to the Payment Card Industry Data Security Standard (PCI DSS), there are common mistakes that every QSA...

BlackCat Operators Distributing Ransomware Disguised as WinSCP via Malvertising

Threat actors linked to the BlackCat ransomware have been seen using malvertising strategies to propagate malicious...

Mobile phone malware and the possible effects of hijackings

Our reliance on mobile phones has soared to unprecedented heights. We entrust them with everything; from banking to...

Managing Cyber Security Risks from Third Parties

You may have heard the saying “A chain is only as strong as its weakest link”. Recent cyber security attacks have shown...

Nice Capita: Incident Impact Research

Executive Summary Capita is a British multinational company that specializes in business process outsourcing and...