top of page
Search


Guarding Online Integrity: A Comprehensive Guide for University Students on Preventing Sextortion
The digital age has brought unprecedented connectivity and convenience to our lives, but it has also given rise to new and alarming...
Aug 30, 20233 min read
18 views

Don't Get Hooked: A Guide to Spotting and Avoiding Phishing Emails
In today's digital age, the prevalence of phishing emails poses a significant threat to individuals, businesses, and institutions alike....
Aug 30, 20233 min read
19 views


How police are helping older people stay safe online
Technology is everywhere – but protecting devices and accounts from cyber criminals is a task that many find difficult. That’s why Cyber...
Aug 17, 20232 min read
38 views


Notts Police links up with HSBC to help customers protect themselves from cybercriminals
Banking customers are to receive tips on defeating cybercriminals thanks to a new police project. Reports of hackings are on the rise and...
Aug 17, 20233 min read
8 views


Huge relief for scam victims as police help recover £300k
Fraud and cyber officers at Nottinghamshire Police have been thanked by victims for helping them recover over £300,000 lost to scammers....
Aug 17, 20233 min read
8 views


Gaming Safely Online to avoid theft of virtual assets
On average an estimated 1.2 billion of us are regularly logging on, signing up and playing online. Unfortunately, whenever money or...
Aug 16, 20233 min read
46 views

New critical authentication bypass bug in Ivanti MobileIron Core
Invanti have recently disclosed a new critical vulnerability in their MobileIron Core mobile device management software. CVE-2023-35082...
Aug 11, 20231 min read
16 views

Clop Ransomware Threat Actor Offers Leaked Data Via Torrents
The Clop Ransomware group has been very active over the past couple of months stealing personal information through attacks exploiting a...
Aug 11, 20232 min read
14 views


Patch Tuesday fixes Remote Code Execution exploit in Microsoft products
The 8th August Patch Tuesday fixes a remote code execution vulnerability that cybercriminals have been actively exploiting in ongoing...
Aug 11, 20231 min read
9 views

EvilProxy phishing campaign targets 120,000 Microsoft 365 users
EvilProxy, has quickly risen to become one of the most popular phishing as a service platforms used by cybercriminals to target Multi...
Aug 11, 20232 min read
7 views

Warning as old email accounts with weak security hacked by cyber criminals
Police are encouraging people to improve their cyber security following a spate of hackings of old email accounts. With email service...
Jul 14, 20232 min read
14 views


Cl0p – Ransomware and threat actor group
The MOVEit cyber-attack has continued to grow with more victims being affected everyday with an estimated 257 organisations and...
Jul 14, 20234 min read
35 views


Introduction to Active Cyber Defence
In an increasingly interconnected world, the threat landscape for cyber-attacks continues to evolve. As technology advances, so do the...
Jul 14, 20233 min read
16 views

Ransomware activity continues to surge despite crypto crime dropping to 62%
Funds flowing into known criminal cryptocurrency accounts were down 65% in the first half of 2023 in comparison to the same period in...
Jul 14, 20232 min read
8 views


What does your digital footprint say about you?
Each one of us has a digital footprint – the data that is left behind whenever you use a digital service. Whether you access the internet...
Jul 14, 20233 min read
20 views


School Resources for Education: Part 2
Schools have an increasing reliance on IT and online systems which makes cyber security an important consideration. As a result, a number...
Jun 13, 20233 min read
19 views


School Resources for Education: Part 1
Schools have an increasing reliance on IT and online systems which makes cyber security an important consideration. As a result, a number...
Jun 13, 20232 min read
19 views

New free NCSC Supply Chain Security E-learning packages available!
Cyber-attacks resulting from vulnerabilities within the supply chain can result in devastating, expensive and long-term ramifications for...
Jun 13, 20232 min read
7 views

MOVEit vulnerability and Zellis data extortion incident
Information about the MOVEit vulnerability that has affected Zellis and its customers, including actions for affected individuals and...
Jun 13, 20232 min read
19 views

Zero-Day Exploited: MOVEit Transfer Critical Vulnerability Alert
An SQL injection vulnerability in the MOVEit Transfer web application is being actively exploited in the wild. Tracked as CVE-2023-34362,...
Jun 9, 20232 min read
18 views
bottom of page