Skip to content

Article (3)

Top Cybersecurity Trends your Organization Needs to Watch Out for in 2023 and Beyond

The cybersecurity landscape is more challenging and complex than ever before. The development of intelligent new...

Key Cyber Moments Of 2022: What Happened And What Have We Learned?

Whether it’s governments, big corporations, or individuals, any organization with an internet connection is a possible...

Every Business is a Target

Despite ransomware incidents continuing to dominate the cyber-related headlines, there seems to be a misconception...

Google Play Store Malware

Fraudulent Google Play Store Applications are Infecting Unsuspecting Users with Malware Although many users consider it...

The Devaluing of Crypto Currency

The Ongoing Devaluing of Cryptocurrencies and Potential Impact on Cybercrime “All the [businesses] shared a common...

Google Chrome Emotet Malware

Google Chrome users are at risk to a new Emotet malware variant that steals Credit Card details If Google Chrome is...

How A Ransomware Gang Caused A National Emergency

Executive Summary Conti are a ransomware group who have been hitting the headlines in recent months, but you might have...

Why The Future Of The Metaverse Depends On Its Security

Executive Summary The metaverse has been making headlines recently, with its promises of merging the digital and...

The Most Common Phishing Themes

Executive Summary Although we’re already a quarter of the way through the year, the cyber security company Zscaler has...

Why You Should Consider A Cyber Assessment

Executive Summary Most systems evolve over time, especially when it comes to subscriptions to services such as...

Uncovering the cracks in Easter egg attacks

Executive Summary Hear the phrase ‘Easter egg’, and we bet the first thing that pops into your head is a sweet treat....

The New Strong Customer Authentication Rules for Online Purchases

Executive Summary Strong Customer Authentication (SCA) became compulsory for services taking all types of electronic...

CSA’s Understanding Of The Okta Data Breach So Far

Executive Summary When it comes to the Lapsus$ hacking group’s recent breach of Okta, the access management software...

The Cyber Risks of Connected Medical Devices

Executive Summary Internet of Things (IoT) devices have become ubiquitous in recent years - there are almost as many of...

The Ransomware Gang That You Should Be Watching Out For

Executive Summary Late last year, the FBI issued a warning about the Cuba ransomware group. You may not have heard of...

Emergency Cyber Hygiene Advice

Executive Summary Many businesses are looking to bolster their cyber defences at the moment, as a result of the...

Critical Infrastructure Attacks: Considerations for Small-to-Medium Enterprises

Executive Summary In the UK, Critical National Infrastructure (CNI) is defined by the National Cyber Security Centre as...

The Cybersecurity Risks of Remote Working, Potential Consequences and Mitigations

Executive Summary When the UK government announced all staff could return to offices on the 27th of January 2022, it...

QR Code Phishing Attacks Could be on the Rise

Executive Summary In the world of phishing, there’s a new(ish) player in the game. A survey conducted by Ivanti...

Why you should be on the lookout for BRATA

Executive Summary IA common misconception is that only Windows, macOS, and Linux computers need cyber security in 2022....

Your data that Facebook could be tracking in 2022

Executive Summary It’s well-known that Facebook is one of the biggest players in the Information and Big Data industry....