Article
- Cyber Security Associates
- October 30, 2024
Introduction With a large amount of confidential and/or proprietary information residing on and flowing through a...
- Cyber Security Associates
- June 20, 2024
In recent months ransomware attacks have undoubtedly picked up pace as well as impact. There have been high-profile...
- Simone Q
- May 30, 2024
Electronic voting or e-vote is the process of casting a vote electronically from a computer phone or tablet.
- Cyber Security Associates
- April 16, 2024
Cybercrime isn’t going anywhere, and its impact continues to have devastating consequences for individuals and...
- Cyber Security Associates
- February 14, 2024
According to the National Cyber Security Centre (NCSC) there were 6.4 million reports of suspicious email activity in...
- Saif Bhoja
- January 19, 2024
British Library Cyber-attack Sends Shockwaves Through Business Community In a startling turn of events, the British...
- James Rowley
- January 15, 2024
Unseen Threats: Navigating the Landscape of Zero-Click Attacks in Cyberspace In our interconnected global landscape...
- Ayman Khan
- November 17, 2023
C2 Framework - MuddyC2Go A C2 Framework (Command and Control) is a set of tools and protocols which allow red teamers...
- Luke Smith
- November 2, 2023
In the ever-evolving landscape of cybersecurity threats, a new ongoing campaign has emerged, known as the Elektra-Leak....
- Saif Bhoja
- October 12, 2023
As Ransomware groups continue to grow, they become increasingly sophisticated and organised, developing help centres...
- Cyber Security Associates
- October 10, 2023
October is Cybersecurity Awareness Month, which is an initiative led by the Cybersecurity and Infrastructure Security...
- Patryk Machowiak
- September 27, 2023
QR codes, also known as Quick Response codes, have become increasingly popular in recent years. They are a convenient...
- Cyber Security Associates
- September 20, 2023
It’s no secret that wearable technology, such as smartwatches and fitness trackers, are increasingly becoming a key...
- Lewis Setherton
- August 25, 2023
When we park or store our cars overnight, we often give thought to the valuable items, careful not to leave them in...
- Patryk Przybocki
- August 18, 2023
With the increased commonplace of 5G technology around the country, interesting and unique challenges have come...
- Bilal Mohammed
- August 11, 2023
Imagine that after a hard day’s work, you suddenly receive a multitude of multifactor authentication (MFA) prompts...
- Cyber Security Associates
- August 2, 2023
When it comes to the Payment Card Industry Data Security Standard (PCI DSS), there are common mistakes that every QSA...
- Alex Babbage
- July 12, 2023
Threat actors linked to the BlackCat ransomware have been seen using malvertising strategies to propagate malicious...
- Patryk Przybocki
- July 7, 2023
Our reliance on mobile phones has soared to unprecedented heights. We entrust them with everything; from banking to...
- Sohaib Saif
- June 22, 2023
You may have heard the saying “A chain is only as strong as its weakest link”. Recent cyber security attacks have shown...
- Patryk Machowiak
- June 17, 2023
Executive Summary Capita is a British multinational company that specializes in business process outsourcing and...