top of page
Search


Mitigating AI Vulnerabilities: Ensuring Secure and Ethical AI Deployment
Artificial Intelligence (AI) is transforming industries by enhancing efficiency, decision-making, and automation. However, as AI adoption...
Apr 23 min read
3 views


Russian Ransomware groups deploying ransomware via Teams
Sophos researchers recently identified a new trend of ransomware groups using teams calls to try and gain remote access to devices to...
Jan 302 min read
11 views

New Star Blizzard WhatsApp spear phishing campaign
Microsoft threat intelligence have uncovered a new spear phishing campaign being carried out by the Russian affiliated...
Jan 302 min read
14 views

Fortinet Zero-Day currently being exploited in the wild
Fortinet have confirmed a critical zero-day exploit is currently being exploited in the wild by cybercriminals. CVE-2024-47575 is a...
Nov 15, 20241 min read
11 views


PDNS - Free Cyber Services for UK Education Sector!
The National Cyber Security Centres Protective Domain Name System (PDNS) has recently been announced to be free for more UK based...
Nov 15, 20241 min read
22 views

International law enforcement crackdown on Black Axe Cybercrime group.
Interpol have recently announced that they have acted against multiple cybercrime organisations within West Africa, Operation Jackal III...
Jul 18, 20241 min read
35 views


Half of Small Medium Enterprises feel unprepared for cyber-threats.
A report carried out by Jumpsec found that 49% of Small Medium Enterprises felt that they lacked the staffing and funding needed to...
Jul 18, 20242 min read
24 views

Cybercriminals abusing URL protections to obfuscate phishing links.
Barracuda have recently identified a new tactic criminals are using to hide malicious phishing links by abusing URL protection services,...
Jul 18, 20242 min read
25 views

UK Insurance and NCSC crackdown on ransomware payments
Three large UK Insurance companies have joined up with the National Cyber Security Centre with the aim of reducing ransomware payments by...
May 21, 20242 min read
18 views


Critical Vulnerabilities discovered in Cinterion Modems
Critical Vulnerabilities have been found by Kaspersky researchers with Cinterion Modems with Telit Cinterion BGS5,...
May 21, 20241 min read
10 views


Online Shopping Fraud hits Over 850,000 Shoppers
Researchers from Security Research (SR) Labs have recently uncovered a network of fake e-commerce stores which are created to steal card...
May 21, 20241 min read
12 views


Officers Run Cyber Escape Rooms with North Notts College
Cyber Protect Officer Mark Lonsdale visited North Notts College to run our cyber investigation escape rooms with students to improve...
Apr 17, 20241 min read
11 views


Cyber Protect Officers Present to the Social Care Sector
Cyber Protect Officers Justin Mekkaoui and John Hammond attended a health and social care event on Tuesday 23rd January 2024 at Boston...
Apr 17, 20241 min read
13 views


The Dangers of Snapchat Being Used As A Sexting Platform
Snapchat, an instant messaging app, has taken the younger generation by storm, with majority using it as their main way of communication....
Mar 4, 20243 min read
957 views


CISA Push for Tech manufacturers To Eliminate Passwords
The Cybersecurity and infrastructure agency in the US has recently published 2 new advisories directed towards manufacturers of tech...
Jan 24, 20241 min read
31 views

BlackCat Returns following law enforcement seizure
The US Department of Justice announced on the 19th of December a operation against the BlackCat Ransomware group with a seizure message...
Dec 27, 20232 min read
26 views

The NCSC warn of further overseas threats to CNI
The National Cyber Security Centre released a warning in their Annual Review 2023 in which they warned off an overseas threat to critical...
Dec 5, 20231 min read
12 views


The Growing Use of AI in Phishing Campaigns
The growth of artificial intelligence (AI) has started to take over the technological world, with many individuals using this function...
Dec 5, 20232 min read
20 views


Understanding the wider criminal ecosystem that surrounds ransomware attacks
Ransomware attacks has increasingly become one of the most popular ways for cyber criminals to obtain pay-outs from organisations and...
Dec 5, 20232 min read
12 views


Secure Your Space: A Student's Guide to Preventing Social Media Account Compromise
Social media has become an integral part of university life, allowing students to connect, share, and engage with peers. However, the...
Aug 30, 20233 min read
27 views
bottom of page