top of page
Search

Nov 15, 20241 min read
Fortinet Zero-Day currently being exploited in the wild
Fortinet have confirmed a critical zero-day exploit is currently being exploited in the wild by cybercriminals. CVE-2024-47575 is a...
10 views


Nov 15, 20241 min read
PDNS - Free Cyber Services for UK Education Sector!
The National Cyber Security Centres Protective Domain Name System (PDNS) has recently been announced to be free for more UK based...
13 views

May 21, 20242 min read
UK Insurance and NCSC crackdown on ransomware payments
Three large UK Insurance companies have joined up with the National Cyber Security Centre with the aim of reducing ransomware payments by...
17 views


May 21, 20241 min read
Critical Vulnerabilities discovered in Cinterion Modems
Critical Vulnerabilities have been found by Kaspersky researchers with Cinterion Modems with Telit Cinterion BGS5,...
10 views


Mar 4, 20243 min read
The Dangers of Snapchat Being Used As A Sexting Platform
Snapchat, an instant messaging app, has taken the younger generation by storm, with majority using it as their main way of communication....
899 views


Jan 24, 20241 min read
CISA Push for Tech manufacturers To Eliminate Passwords
The Cybersecurity and infrastructure agency in the US has recently published 2 new advisories directed towards manufacturers of tech...
31 views


Dec 5, 20232 min read
The Growing Use of AI in Phishing Campaigns
The growth of artificial intelligence (AI) has started to take over the technological world, with many individuals using this function...
20 views


Aug 30, 20233 min read
Secure Your Space: A Student's Guide to Preventing Social Media Account Compromise
Social media has become an integral part of university life, allowing students to connect, share, and engage with peers. However, the...
27 views

Aug 30, 20233 min read
Don't Get Hooked: A Guide to Spotting and Avoiding Phishing Emails
In today's digital age, the prevalence of phishing emails poses a significant threat to individuals, businesses, and institutions alike....
19 views


Aug 16, 20233 min read
Gaming Safely Online to avoid theft of virtual assets
On average an estimated 1.2 billion of us are regularly logging on, signing up and playing online. Unfortunately, whenever money or...
46 views

Aug 11, 20231 min read
New critical authentication bypass bug in Ivanti MobileIron Core
Invanti have recently disclosed a new critical vulnerability in their MobileIron Core mobile device management software. CVE-2023-35082...
16 views

Aug 11, 20232 min read
Clop Ransomware Threat Actor Offers Leaked Data Via Torrents
The Clop Ransomware group has been very active over the past couple of months stealing personal information through attacks exploiting a...
14 views

Aug 11, 20232 min read
EvilProxy phishing campaign targets 120,000 Microsoft 365 users
EvilProxy, has quickly risen to become one of the most popular phishing as a service platforms used by cybercriminals to target Multi...
7 views

Jul 14, 20232 min read
Warning as old email accounts with weak security hacked by cyber criminals
Police are encouraging people to improve their cyber security following a spate of hackings of old email accounts. With email service...
14 views


Jul 14, 20233 min read
Introduction to Active Cyber Defence
In an increasingly interconnected world, the threat landscape for cyber-attacks continues to evolve. As technology advances, so do the...
16 views


Jul 14, 20233 min read
What does your digital footprint say about you?
Each one of us has a digital footprint – the data that is left behind whenever you use a digital service. Whether you access the internet...
20 views


Jun 13, 20232 min read
School Resources for Education: Part 1
Schools have an increasing reliance on IT and online systems which makes cyber security an important consideration. As a result, a number...
19 views

Jun 13, 20232 min read
New free NCSC Supply Chain Security E-learning packages available!
Cyber-attacks resulting from vulnerabilities within the supply chain can result in devastating, expensive and long-term ramifications for...
7 views

May 3, 20232 min read
Google Authenticator App Update Gets Cloud Backup Feature for One Time Codes
Google unveiled a major update to its 12-year-old Authenticator app for Android and iOS with an account synchronization option that...
22 views


Apr 19, 20232 min read
Legacy Email Security Risk! – Do you have a legacy email account or one that has not been secured?
There are many email security challenges caused by legacy email account providers, but we are here to help you determine the best...
75 views
bottom of page