Article (2)
- Sarah Lane
- June 2, 2023
Executive Summary The modern day era is constantly changing and we are increasingly integrating technology into our...
- Bilal Mohammed
- May 11, 2023
Executive Summary It comes as no surprise that as artificial intelligence (AI) rapidly evolve and becomes more widely...
- Sohaib Saif
- May 4, 2023
Executive Summary In recent years, the internet has become a hub for many activities, ranging from online shopping to...
- Jake Dancey
- April 28, 2023
Executive Summary In April 2023, a surge in the use of an outdated WordPress plugin called Eval PHP was reported by...
- Patryk Machowiak
- April 27, 2023
Executive Summary On the 31st of March at 2:00pm, The Times reporter, Katie Prescott, published an article speculating...
- Sohaib Saif
- March 30, 2023
Executive Summary During the Covid-19 pandemic, TikTok quickly became one of the most popular social media platforms...
- Alex Babbage
- March 3, 2023
Executive Summary An unidentified threat actor was identified by Menlo Labs using Discord to spread an evasive threat...
- Thomas Hope
- January 30, 2023
Executive Summary One of the most important tasks for an attacker using malware to successfully compromise a target, is...
- Cyber Security Associates
- January 17, 2023
Executive Summary Although the ongoing war between Russia and Ukraine is well known since the invasion in February...
- Cyber Security Associates
- December 1, 2022
The cybersecurity landscape is more challenging and complex than ever before. The development of intelligent new...
- Cyber Security Associates
- December 1, 2022
Whether it’s governments, big corporations, or individuals, any organization with an internet connection is a possible...
- Cyber Security Associates
- November 8, 2022
Despite ransomware incidents continuing to dominate the cyber-related headlines, there seems to be a misconception...
- Cyber Security Associates
- July 25, 2022
Fraudulent Google Play Store Applications are Infecting Unsuspecting Users with Malware Although many users consider it...
- Cyber Security Associates
- July 4, 2022
The Ongoing Devaluing of Cryptocurrencies and Potential Impact on Cybercrime “All the [businesses] shared a common...
- Cyber Security Associates
- June 17, 2022
Google Chrome users are at risk to a new Emotet malware variant that steals Credit Card details If Google Chrome is...
- Cyber Security Associates
- May 23, 2022
Executive Summary Conti are a ransomware group who have been hitting the headlines in recent months, but you might have...
- Cyber Security Associates
- May 16, 2022
Executive Summary The metaverse has been making headlines recently, with its promises of merging the digital and...
- Cyber Security Associates
- May 5, 2022
Executive Summary Although we’re already a quarter of the way through the year, the cyber security company Zscaler has...
- Cyber Security Associates
- April 26, 2022
Executive Summary Most systems evolve over time, especially when it comes to subscriptions to services such as...
- Cyber Security Associates
- April 14, 2022
Executive Summary Hear the phrase ‘Easter egg’, and we bet the first thing that pops into your head is a sweet treat....
- Cyber Security Associates
- April 1, 2022
Executive Summary Strong Customer Authentication (SCA) became compulsory for services taking all types of electronic...