Skip to content

Article (2)

Common PCI DSS Mistakes

When it comes to the Payment Card Industry Data Security Standard (PCI DSS), there are common mistakes that every QSA...

BlackCat Operators Distributing Ransomware Disguised as WinSCP via Malvertising

Threat actors linked to the BlackCat ransomware have been seen using malvertising strategies to propagate malicious...

Mobile phone malware and the possible effects of hijackings

Our reliance on mobile phones has soared to unprecedented heights. We entrust them with everything; from banking to...

Managing Cyber Security Risks from Third Parties

You may have heard the saying “A chain is only as strong as its weakest link”. Recent cyber security attacks have shown...

Nice Capita: Incident Impact Research

Executive Summary Capita is a British multinational company that specializes in business process outsourcing and...

The Dark Side of QR Codes

Executive Summary The modern day era is constantly changing and we are increasingly integrating technology into our...

The Dark Side of AI: Unravelling The Next Wave of Cyber Threats

Executive Summary It comes as no surprise that as artificial intelligence (AI) rapidly evolve and becomes more widely...

The Rise of Malverposting

Executive Summary In recent years, the internet has become a hub for many activities, ranging from online shopping to...

Outdated WordPress Plugin – Eval PHP

Executive Summary In April 2023, a surge in the use of an outdated WordPress plugin called Eval PHP was reported by...

Capita Ransomware Incident Summary

Executive Summary On the 31st of March at 2:00pm, The Times reporter, Katie Prescott, published an article speculating...

Are Social Media Apps Like TikTok Spying on us?

Executive Summary During the Covid-19 pandemic, TikTok quickly became one of the most popular social media platforms...

PureCrypter Malware Targets Government Entities in Asia-Pacific and North America

Executive Summary An unidentified threat actor was identified by Menlo Labs using Discord to spread an evasive threat...

DEV-0569 & Google Ads

Executive Summary One of the most important tasks for an attacker using malware to successfully compromise a target, is...

The use of Cyber Warfare alongside Kinetic Warfare

Executive Summary Although the ongoing war between Russia and Ukraine is well known since the invasion in February...

Top Cybersecurity Trends your Organization Needs to Watch Out for in 2023 and Beyond

The cybersecurity landscape is more challenging and complex than ever before. The development of intelligent new...

Key Cyber Moments Of 2022: What Happened And What Have We Learned?

Whether it’s governments, big corporations, or individuals, any organization with an internet connection is a possible...

Every Business is a Target

Despite ransomware incidents continuing to dominate the cyber-related headlines, there seems to be a misconception...

Google Play Store Malware

Fraudulent Google Play Store Applications are Infecting Unsuspecting Users with Malware Although many users consider it...

The Devaluing of Crypto Currency

The Ongoing Devaluing of Cryptocurrencies and Potential Impact on Cybercrime “All the [businesses] shared a common...

Google Chrome Emotet Malware

Google Chrome users are at risk to a new Emotet malware variant that steals Credit Card details If Google Chrome is...

How A Ransomware Gang Caused A National Emergency

Executive Summary Conti are a ransomware group who have been hitting the headlines in recent months, but you might have...