Cybersecurity researchers have warned of a malicious campaign targeting users of the Python Package Index...
A 51-year-old dual Russian and Israeli national who is alleged to be a developer of...
The GSM Association (GSMA) has formally announced support for end-to-end encryption (E2EE) for securing messages...
Cyber threats evolve daily. In this live webinar, learn exactly how ransomware attacks unfold—from the...
Most microsegmentation projects fail before they even get off the ground—too complex, too slow, too...
Users searching for pirated software are the target of a new malware campaign that delivers...
A new malware campaign has been observed leveraging social engineering tactics to deliver an open-source...
Microsoft has shed light on an ongoing phishing campaign that targeted the hospitality sector by...
The North Korea-linked threat actor known as ScarCruft is said to have been behind a...
Overview The National Institute of Standards and Technology’s (NIST) National Cybersecurity Center of Excellence (NCCoE)...
Two high-severity security flaws have been disclosed in the open-source ruby-saml library that could allow...
Applying patches may be a basic security principle, but that doesn’t mean it’s always easy...
Why the NCSC decided to advise against this long-established security guideline....
As IT environments grow more complex, IT professionals are facing unprecedented pressure to secure business-critical...
Discover the Research Institute in Trustworthy Inter-connected Cyber-physical Systems....
Meta has warned that a security vulnerability impacting the FreeType open-source font rendering library may...
Browser maker Mozilla is urging users to update their Firefox instances to the latest version...
The China-nexus cyber espionage group tracked as UNC3886 has been observed targeting end-of-life MX routers...
What you need to know before buying artificially intelligent security products...
New NCSC training package to help schools improve their cyber security....
Threat intelligence firm GreyNoise is warning of a “coordinated surge” in the exploitation of Server-Side...
First joint National Cyber Security Centre (NCSC) and National Crime Agency (NCA) report published today....
A summary of the NCSC’s security analysis for the UK telecoms sector...
How to limit the effectiveness of tools commonly used by malicious actors....
Cyber incident trends in the UK with guidance on how to defend against, and recover...
NCSC technical paper about the privacy and security design of the NHS contact tracing app...
The year three report covers 2019 and aims to highlight the achievements and efforts made...
We’ve been hearing the same story for years: AI is coming for your job. In...
Guidance for organisations wishing to deploy products that use IPsec....
Questions to ask your suppliers that will help you gain confidence in their cyber security....
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.