Ransomware doesn’t hit all at once—it slowly floods your defenses in stages. Like a ship...
Australia has become the latest country to ban the installation of security software from Russian...
Cryptocurrency exchange Bybit on Friday revealed that a “sophisticated” attack led to the theft of...
OpenAI on Friday revealed that it banned a set of accounts that used its ChatGPT...
Apple is removing its Advanced Data Protection (ADP) feature for iCloud from the United Kingdom...
An analysis of a data leak from a Chinese cybersecurity company TopSec has revealed that...
The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform appear to be readying a new...
In today’s rapidly evolving digital landscape, weak identity security isn’t just a flaw—it’s a major...
Wherever there’s been conflict in the world, propaganda has never been far away. Travel back...
Cisco has confirmed that a Chinese threat actor known as Salt Typhoon gained access by...
A high-severity security flaw impacting the Craft content management system (CMS) has been added by...
Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures...
The payment card industry has set a critical deadline for businesses handling cardholder data or...
A previously unknown threat activity cluster targeted European organizations, particularly those in the healthcare sector,...
A malware campaign distributing the XLoader malware has been observed using the DLL side-loading technique...
For decades, Microsoft Exchange has been the backbone of business communications, powering emailing, scheduling and...
Citrix has released security updates for a high-severity security flaw impacting NetScaler Console (formerly NetScaler...
Microsoft has released security updates to address two Critical-rated flaws impacting Bing and Power Pages,...
Multiple Russia-aligned threat actors have been observed targeting individuals of interest via the privacy-focused messaging...
Assessing the cyber security threat to UK Universities...
How charities can erase personal data from donated laptops, phones and tablets, before passing them...
Focused on automating UEFI firmware updates on Windows devices....
A structured look at what data to collect for security purposes and when to collect...
Some tips on good diagram drafting and pitfalls to avoid when trying to understand a...
An architecture pattern for safely importing data into a system from an external source....
The following tips can help organisations create their own cyber incident response exercises....
This guidance describes a set of technical security outcomes that are considered to represent appropriate...
How to implement a secure end-to-end data export solution...
A brief guide to MIKEY-SAKKE, a protocol that allows organisations to provide secure communications with...
A new variant of the Snake Keylogger malware is being used to actively target Windows...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.