Skip to content

Security Operations

Unseen Threats: Navigating the Landscape of Zero-Click Attacks in Cyberspace

Unseen Threats: Navigating the Landscape of Zero-Click Attacks in Cyberspace In our interconnected global landscape...

’Hit and Run’ Electric cars and the chips susceptible to hardware hacks

When we park or store our cars overnight, we often give thought to the valuable items, careful not to leave them in...

5G, the Next Generation of Networking?

With the increased commonplace of 5G technology around the country, interesting and unique challenges have come...

Battling MFA Fatigue: A Rising Challenge in the Current Threat Landscape

Imagine that after a hard day’s work, you suddenly receive a multitude of multifactor authentication (MFA) prompts...

BlackCat Operators Distributing Ransomware Disguised as WinSCP via Malvertising

Threat actors linked to the BlackCat ransomware have been seen using malvertising strategies to propagate malicious...

Mobile phone malware and the possible effects of hijackings

Our reliance on mobile phones has soared to unprecedented heights. We entrust them with everything; from banking to...

Managing Cyber Security Risks from Third Parties

You may have heard the saying “A chain is only as strong as its weakest link”. Recent cyber security attacks have shown...

Nice Capita: Incident Impact Research

Executive Summary Capita is a British multinational company that specializes in business process outsourcing and...

The Dark Side of QR Codes

Executive Summary The modern day era is constantly changing and we are increasingly integrating technology into our...

The Dark Side of AI: Unravelling The Next Wave of Cyber Threats

Executive Summary It comes as no surprise that as artificial intelligence (AI) rapidly evolve and becomes more widely...

The Rise of Malverposting

Executive Summary In recent years, the internet has become a hub for many activities, ranging from online shopping to...

Outdated WordPress Plugin – Eval PHP

Executive Summary In April 2023, a surge in the use of an outdated WordPress plugin called Eval PHP was reported by...

Capita Ransomware Incident Summary

Executive Summary On the 31st of March at 2:00pm, The Times reporter, Katie Prescott, published an article speculating...

Are Social Media Apps Like TikTok Spying on us?

Executive Summary During the Covid-19 pandemic, TikTok quickly became one of the most popular social media platforms...

PureCrypter Malware Targets Government Entities in Asia-Pacific and North America

Executive Summary An unidentified threat actor was identified by Menlo Labs using Discord to spread an evasive threat...

DEV-0569 & Google Ads

Executive Summary One of the most important tasks for an attacker using malware to successfully compromise a target, is...

What is SquirrelWaffle?

Executive Summary SquirrelWaffle is known as a dropper malware, where it would be used to download additional and...