Skip to content

Article (2)

Working from Home? 5 Steps to Secure Your Home Network

Introduction With a large amount of confidential and/or proprietary information residing on and flowing through a...

Cyber Threat Briefing: Implementing Ransomware Controls

In recent months ransomware attacks have undoubtedly picked up pace as well as impact. There have been high-profile...

Cybersecurity’s lights and shadows of e-vote

Electronic voting or e-vote is the process of casting a vote electronically from a computer phone or tablet.

Vulnerability Management Program: What Makes it Good and What Does Success Look Like?

Cybercrime isn’t going anywhere, and its impact continues to have devastating consequences for individuals and...

Why Prioritizing Password Management and Good Cyber Hygiene is Key to Reducing Risk

According to the National Cyber Security Centre (NCSC) there were 6.4 million reports of suspicious email activity in...

British Library Cyber-attack Sends Shockwaves Through Business Community

British Library Cyber-attack Sends Shockwaves Through Business Community In a startling turn of events, the British...

Unseen Threats: Navigating the Landscape of Zero-Click Attacks in Cyberspace

Unseen Threats: Navigating the Landscape of Zero-Click Attacks in Cyberspace In our interconnected global landscape...

C2 Framework - MuddyC2Go

C2 Framework - MuddyC2Go A C2 Framework (Command and Control) is a set of tools and protocols which allow red teamers...

EleKtra-Leak: Unmasking the Cryptojacking Menace

In the ever-evolving landscape of cybersecurity threats, a new ongoing campaign has emerged, known as the Elektra-Leak....

Ransomware as a service: A successful business model

As Ransomware groups continue to grow, they become increasingly sophisticated and organised, developing help centres...

From Professional Footballer to Cybersecurity Consultant

October is Cybersecurity Awareness Month, which is an initiative led by the Cybersecurity and Infrastructure Security...

QR Phishing: The Scam That's Sneaking Up Behind You

QR codes, also known as Quick Response codes, have become increasingly popular in recent years. They are a convenient...