top of page
Search


Mitigating AI Vulnerabilities: Ensuring Secure and Ethical AI Deployment
Artificial Intelligence (AI) is transforming industries by enhancing efficiency, decision-making, and automation. However, as AI adoption...
Apr 23 min read
3 views


PDNS - Free Cyber Services for UK Education Sector!
The National Cyber Security Centres Protective Domain Name System (PDNS) has recently been announced to be free for more UK based...
Nov 15, 20241 min read
22 views


Half of Small Medium Enterprises feel unprepared for cyber-threats.
A report carried out by Jumpsec found that 49% of Small Medium Enterprises felt that they lacked the staffing and funding needed to...
Jul 18, 20242 min read
24 views

Cybercriminals abusing URL protections to obfuscate phishing links.
Barracuda have recently identified a new tactic criminals are using to hide malicious phishing links by abusing URL protection services,...
Jul 18, 20242 min read
25 views

UK Insurance and NCSC crackdown on ransomware payments
Three large UK Insurance companies have joined up with the National Cyber Security Centre with the aim of reducing ransomware payments by...
May 21, 20242 min read
18 views


Online Shopping Fraud hits Over 850,000 Shoppers
Researchers from Security Research (SR) Labs have recently uncovered a network of fake e-commerce stores which are created to steal card...
May 21, 20241 min read
12 views


CISA Push for Tech manufacturers To Eliminate Passwords
The Cybersecurity and infrastructure agency in the US has recently published 2 new advisories directed towards manufacturers of tech...
Jan 24, 20241 min read
31 views

The NCSC warn of further overseas threats to CNI
The National Cyber Security Centre released a warning in their Annual Review 2023 in which they warned off an overseas threat to critical...
Dec 5, 20231 min read
12 views


Understanding the wider criminal ecosystem that surrounds ransomware attacks
Ransomware attacks has increasingly become one of the most popular ways for cyber criminals to obtain pay-outs from organisations and...
Dec 5, 20232 min read
12 views

Warning as old email accounts with weak security hacked by cyber criminals
Police are encouraging people to improve their cyber security following a spate of hackings of old email accounts. With email service...
Jul 14, 20232 min read
14 views


Introduction to Active Cyber Defence
In an increasingly interconnected world, the threat landscape for cyber-attacks continues to evolve. As technology advances, so do the...
Jul 14, 20233 min read
16 views

Ransomware activity continues to surge despite crypto crime dropping to 62%
Funds flowing into known criminal cryptocurrency accounts were down 65% in the first half of 2023 in comparison to the same period in...
Jul 14, 20232 min read
8 views

New free NCSC Supply Chain Security E-learning packages available!
Cyber-attacks resulting from vulnerabilities within the supply chain can result in devastating, expensive and long-term ramifications for...
Jun 13, 20232 min read
7 views

MOVEit vulnerability and Zellis data extortion incident
Information about the MOVEit vulnerability that has affected Zellis and its customers, including actions for affected individuals and...
Jun 13, 20232 min read
19 views


Legacy Email Security Risk! – Do you have a legacy email account or one that has not been secured?
There are many email security challenges caused by legacy email account providers, but we are here to help you determine the best...
Apr 19, 20232 min read
76 views


Google discovers multiple zero-day exploits in Samsung and Google devices
The Project Zero team at Google have recently published a new blog about a series of vulnerabilities they have discovered with the Exynos...
Mar 21, 20231 min read
20 views

Are you prepared for the long haul on Russia-Ukraine?
The NCSC assesses the cyber threat to the UK as a result of the conflict remains heightened and organisations are urged to not let their...
Jul 7, 20221 min read
16 views


Protecting your business from PowerShell Exploitation
The NCSC alongside the National Security Agency recently published a report detailing how PowerShell could be used by hostile parties and...
Jun 27, 20222 min read
31 views


Supply Chain Attacks And Compromise
Supply chains can be large and complex, involving many suppliers doing many different things. Effectively securing the supply chain can...
Mar 21, 20222 min read
70 views


Cyber Threat Heightened - Incident Response
The threat an organisation faces may vary over time. At any point, there is a need to strike a balance between the current threat, the...
Mar 14, 20222 min read
25 views
bottom of page