Trusted Cyber Security Experts
25+ Years Industry Experience
Ethical, Professional & Pragmatic
Log4Shell (still) actively exploited on VMware Systems
The Cybersecurity and Infrastructure Security Agency (CISA) and United States Coast Guard Cyber Command (CGCYBER) released a joint security advisory last week to warn of the active exploitation of CVE-2021-44228.
How the Phone-Wiping Banking Trojan BRATA is Becoming a More Advanced Threat
First discovered in 2019, BRATA malware is contained in a malicious app which victims are tricked into installing on their phones. BRATA is a banking Trojan that gains access to
CISA Warn of 40 New Actively Exploited Cybersecurity Vulnerabilities This Month So Far
Last week saw the addition of 39 known exploited cybersecurity vulnerabilities to the CISA catalogue, bringing the total added in June so far to 40. The Cybersecurity and Infrastructure Security
10 Common Security Weaknesses and How To Defend Against Them
The mistakes we make and how to fix them – a new report co-authored by the NCSC reveals the 10 most common security weaknesses exploited by hackers. A joint security
Phishing Report 2022: Which Individuals Are Most at Risk
In 2022 phishing will be bigger than it ever has been, with sophisticated new methods meaning that an increasing number of people are falling for attackers’ tricks, regardless of their
Top 15 Most Exploited Vulnerabilities for 2021
The 15 most targeted security vulnerabilities of 2021 have just been published in a joint advisory from the NCSC. These are the main ways hackers are attacking businesses around the
How to improve your supply chain security
The security of every business is dependent on the security of its suppliers. From the PCs on peoples desks, to the servers in cloud, the firewalls in the office and
What is PIPEDREAM malware?
Since Stuxnet was used to damage Iran’s nuclear aspiration in 2010, there has been a dawning realisation that malware is not just a threat in cyberspace – it can cause
What is a Use After Free Vulnerability?
‘Use After Free’ is the name given to security vulnerabilities that occur because of a problem with the way an application is managing its memory. When one part of a
Why Asset Management is important for Cybersecurity
As a security manager you can only protect systems that you know about. Asset Management is the art and science of keeping track of all the devices connected to your
What does the Russian invasion of Ukraine mean for UK cyber security?
Russia’s deployment of troops into Ukraine is the physical side of a war that has been raging for some time in cyber space. How might your UK business get caught
The evolving risks from Ransomware
This week the NCSC issued a warning of the evolving risks posed by Ransomware, with increasingly sophisticated techniques being used to extort money from businesses around the world. The National
Subscribe to our monthly newsletter today
If you’d like to stay up-to-date with the latest cyber security news and articles from our technical team, you can sign up to our monthly newsletter.
We hate spam as much as you do, so we promise not to bombard you with emails. We’ll send you a single, curated email each month that contains all of our cyber security news and articles for that month.