top of page
Search


The NCSC warn of further overseas threats to CNI
The National Cyber Security Centre released a warning in their Annual Review 2023 in which they warned off an overseas threat to critical...
Dec 5, 20231 min read


The Growing Use of AI in Phishing Campaigns
The growth of artificial intelligence (AI) has started to take over the technological world, with many individuals using this function...
Dec 5, 20232 min read


Understanding the wider criminal ecosystem that surrounds ransomware attacks
Ransomware attacks has increasingly become one of the most popular ways for cyber criminals to obtain pay-outs from organisations and...
Dec 5, 20232 min read


Secure Your Space: A Student's Guide to Preventing Social Media Account Compromise
Social media has become an integral part of university life, allowing students to connect, share, and engage with peers. However, the...
Aug 30, 20233 min read


Guarding Online Integrity: A Comprehensive Guide for University Students on Preventing Sextortion
The digital age has brought unprecedented connectivity and convenience to our lives, but it has also given rise to new and alarming...
Aug 30, 20233 min read


Don't Get Hooked: A Guide to Spotting and Avoiding Phishing Emails
In today's digital age, the prevalence of phishing emails poses a significant threat to individuals, businesses, and institutions alike....
Aug 30, 20233 min read


Gaming Safely Online to avoid theft of virtual assets
On average an estimated 1.2 billion of us are regularly logging on, signing up and playing online. Unfortunately, whenever money or...
Aug 16, 20233 min read


New critical authentication bypass bug in Ivanti MobileIron Core
Invanti have recently disclosed a new critical vulnerability in their MobileIron Core mobile device management software. CVE-2023-35082...
Aug 11, 20231 min read


Clop Ransomware Threat Actor Offers Leaked Data Via Torrents
The Clop Ransomware group has been very active over the past couple of months stealing personal information through attacks exploiting a...
Aug 11, 20232 min read


Patch Tuesday fixes Remote Code Execution exploit in Microsoft products
The 8th August Patch Tuesday fixes a remote code execution vulnerability that cybercriminals have been actively exploiting in ongoing...
Aug 11, 20231 min read


EvilProxy phishing campaign targets 120,000 Microsoft 365 users
EvilProxy, has quickly risen to become one of the most popular phishing as a service platforms used by cybercriminals to target Multi...
Aug 11, 20232 min read


Warning as old email accounts with weak security hacked by cyber criminals
Police are encouraging people to improve their cyber security following a spate of hackings of old email accounts. With email service...
Jul 14, 20232 min read


Cl0p – Ransomware and threat actor group
The MOVEit cyber-attack has continued to grow with more victims being affected everyday with an estimated 257 organisations and...
Jul 14, 20234 min read


Introduction to Active Cyber Defence
In an increasingly interconnected world, the threat landscape for cyber-attacks continues to evolve. As technology advances, so do the...
Jul 14, 20233 min read
bottom of page
