Security Operations
- James Rowley
- January 15, 2024
Unseen Threats: Navigating the Landscape of Zero-Click Attacks in Cyberspace In our interconnected global landscape...
- Lewis Setherton
- August 25, 2023
When we park or store our cars overnight, we often give thought to the valuable items, careful not to leave them in...
- Patryk Przybocki
- August 18, 2023
With the increased commonplace of 5G technology around the country, interesting and unique challenges have come...
- Bilal Mohammed
- August 11, 2023
Imagine that after a hard day’s work, you suddenly receive a multitude of multifactor authentication (MFA) prompts...
- Alex Babbage
- July 12, 2023
Threat actors linked to the BlackCat ransomware have been seen using malvertising strategies to propagate malicious...
- Patryk Przybocki
- July 7, 2023
Our reliance on mobile phones has soared to unprecedented heights. We entrust them with everything; from banking to...
- Sohaib Saif
- June 22, 2023
You may have heard the saying “A chain is only as strong as its weakest link”. Recent cyber security attacks have shown...
- Patryk Machowiak
- June 17, 2023
Executive Summary Capita is a British multinational company that specializes in business process outsourcing and...
- Sarah Lane
- June 2, 2023
Executive Summary The modern day era is constantly changing and we are increasingly integrating technology into our...
- Bilal Mohammed
- May 11, 2023
Executive Summary It comes as no surprise that as artificial intelligence (AI) rapidly evolve and becomes more widely...
- Sohaib Saif
- May 4, 2023
Executive Summary In recent years, the internet has become a hub for many activities, ranging from online shopping to...
- Jake Dancey
- April 28, 2023
Executive Summary In April 2023, a surge in the use of an outdated WordPress plugin called Eval PHP was reported by...
- Patryk Machowiak
- April 27, 2023
Executive Summary On the 31st of March at 2:00pm, The Times reporter, Katie Prescott, published an article speculating...
- Sohaib Saif
- March 30, 2023
Executive Summary During the Covid-19 pandemic, TikTok quickly became one of the most popular social media platforms...
- Alex Babbage
- March 3, 2023
Executive Summary An unidentified threat actor was identified by Menlo Labs using Discord to spread an evasive threat...
- Thomas Hope
- January 30, 2023
Executive Summary One of the most important tasks for an attacker using malware to successfully compromise a target, is...
- Cyber Security Associates
- December 29, 2021
Executive Summary SquirrelWaffle is known as a dropper malware, where it would be used to download additional and...