top of page
Search

New critical authentication bypass bug in Ivanti MobileIron Core
Invanti have recently disclosed a new critical vulnerability in their MobileIron Core mobile device management software. CVE-2023-35082...
Aug 11, 20231 min read
16 views


Introduction to Active Cyber Defence
In an increasingly interconnected world, the threat landscape for cyber-attacks continues to evolve. As technology advances, so do the...
Jul 14, 20233 min read
16 views


DNS data shows one in ten organisations have malware traffic on their networks
Research has been conducted by Akamai around Command and control (C2) traffic to understand prevalent threats in corporate and home...
Apr 19, 20232 min read
28 views


Legacy Email Security Risk! – Do you have a legacy email account or one that has not been secured?
There are many email security challenges caused by legacy email account providers, but we are here to help you determine the best...
Apr 19, 20232 min read
76 views


‘Cyber Essentials’ What is it and who is it for?
Cyber Essentials is a simple but effective government-backed scheme that will help protect organisations, whatever the size, against a...
Jul 21, 20222 min read
21 views

Are you prepared for the long haul on Russia-Ukraine?
The NCSC assesses the cyber threat to the UK as a result of the conflict remains heightened and organisations are urged to not let their...
Jul 7, 20221 min read
16 views
bottom of page