top of page
Search


Mitigating AI Vulnerabilities: Ensuring Secure and Ethical AI Deployment
Artificial Intelligence (AI) is transforming industries by enhancing efficiency, decision-making, and automation. However, as AI adoption...
Apr 23 min read
3 views

Fortinet Zero-Day currently being exploited in the wild
Fortinet have confirmed a critical zero-day exploit is currently being exploited in the wild by cybercriminals. CVE-2024-47575 is a...
Nov 15, 20241 min read
11 views


PDNS - Free Cyber Services for UK Education Sector!
The National Cyber Security Centres Protective Domain Name System (PDNS) has recently been announced to be free for more UK based...
Nov 15, 20241 min read
22 views

UK Insurance and NCSC crackdown on ransomware payments
Three large UK Insurance companies have joined up with the National Cyber Security Centre with the aim of reducing ransomware payments by...
May 21, 20242 min read
18 views


Critical Vulnerabilities discovered in Cinterion Modems
Critical Vulnerabilities have been found by Kaspersky researchers with Cinterion Modems with Telit Cinterion BGS5,...
May 21, 20241 min read
10 views


The Dangers of Snapchat Being Used As A Sexting Platform
Snapchat, an instant messaging app, has taken the younger generation by storm, with majority using it as their main way of communication....
Mar 4, 20243 min read
957 views


CISA Push for Tech manufacturers To Eliminate Passwords
The Cybersecurity and infrastructure agency in the US has recently published 2 new advisories directed towards manufacturers of tech...
Jan 24, 20241 min read
31 views


The Growing Use of AI in Phishing Campaigns
The growth of artificial intelligence (AI) has started to take over the technological world, with many individuals using this function...
Dec 5, 20232 min read
20 views


Secure Your Space: A Student's Guide to Preventing Social Media Account Compromise
Social media has become an integral part of university life, allowing students to connect, share, and engage with peers. However, the...
Aug 30, 20233 min read
27 views

Don't Get Hooked: A Guide to Spotting and Avoiding Phishing Emails
In today's digital age, the prevalence of phishing emails poses a significant threat to individuals, businesses, and institutions alike....
Aug 30, 20233 min read
19 views


Gaming Safely Online to avoid theft of virtual assets
On average an estimated 1.2 billion of us are regularly logging on, signing up and playing online. Unfortunately, whenever money or...
Aug 16, 20233 min read
46 views

New critical authentication bypass bug in Ivanti MobileIron Core
Invanti have recently disclosed a new critical vulnerability in their MobileIron Core mobile device management software. CVE-2023-35082...
Aug 11, 20231 min read
16 views

Clop Ransomware Threat Actor Offers Leaked Data Via Torrents
The Clop Ransomware group has been very active over the past couple of months stealing personal information through attacks exploiting a...
Aug 11, 20232 min read
14 views

EvilProxy phishing campaign targets 120,000 Microsoft 365 users
EvilProxy, has quickly risen to become one of the most popular phishing as a service platforms used by cybercriminals to target Multi...
Aug 11, 20232 min read
7 views

Warning as old email accounts with weak security hacked by cyber criminals
Police are encouraging people to improve their cyber security following a spate of hackings of old email accounts. With email service...
Jul 14, 20232 min read
14 views


Introduction to Active Cyber Defence
In an increasingly interconnected world, the threat landscape for cyber-attacks continues to evolve. As technology advances, so do the...
Jul 14, 20233 min read
16 views


What does your digital footprint say about you?
Each one of us has a digital footprint – the data that is left behind whenever you use a digital service. Whether you access the internet...
Jul 14, 20233 min read
20 views


School Resources for Education: Part 1
Schools have an increasing reliance on IT and online systems which makes cyber security an important consideration. As a result, a number...
Jun 13, 20232 min read
19 views

New free NCSC Supply Chain Security E-learning packages available!
Cyber-attacks resulting from vulnerabilities within the supply chain can result in devastating, expensive and long-term ramifications for...
Jun 13, 20232 min read
7 views

Google Authenticator App Update Gets Cloud Backup Feature for One Time Codes
Google unveiled a major update to its 12-year-old Authenticator app for Android and iOS with an account synchronization option that...
May 3, 20232 min read
22 views
bottom of page