top of page
Search


Secure Your Space: A Student's Guide to Preventing Social Media Account Compromise
Social media has become an integral part of university life, allowing students to connect, share, and engage with peers. However, the...
Aug 30, 20233 min read
Â
Â


Guarding Online Integrity: A Comprehensive Guide for University Students on Preventing Sextortion
The digital age has brought unprecedented connectivity and convenience to our lives, but it has also given rise to new and alarming...
Aug 30, 20233 min read
Â
Â


Don't Get Hooked: A Guide to Spotting and Avoiding Phishing Emails
In today's digital age, the prevalence of phishing emails poses a significant threat to individuals, businesses, and institutions alike....
Aug 30, 20233 min read
Â
Â


How police are helping older people stay safe online
Technology is everywhere – but protecting devices and accounts from cyber criminals is a task that many find difficult. That’s why Cyber...
Aug 17, 20232 min read
Â
Â


Notts Police links up with HSBC to help customers protect themselves from cybercriminals
Banking customers are to receive tips on defeating cybercriminals thanks to a new police project. Reports of hackings are on the rise and...
Aug 17, 20233 min read
Â
Â


Huge relief for scam victims as police help recover £300k
Fraud and cyber officers at Nottinghamshire Police have been thanked by victims for helping them recover over £300,000 lost to scammers....
Aug 17, 20233 min read
Â
Â


Gaming Safely Online to avoid theft of virtual assets
On average an estimated 1.2 billion of us are regularly logging on, signing up and playing online. Unfortunately, whenever money or...
Aug 16, 20233 min read
Â
Â


New critical authentication bypass bug in Ivanti MobileIron Core
Invanti have recently disclosed a new critical vulnerability in their MobileIron Core mobile device management software. CVE-2023-35082...
Aug 11, 20231 min read
Â
Â


Clop Ransomware Threat Actor Offers Leaked Data Via Torrents
The Clop Ransomware group has been very active over the past couple of months stealing personal information through attacks exploiting a...
Aug 11, 20232 min read
Â
Â


Patch Tuesday fixes Remote Code Execution exploit in Microsoft products
The 8th August Patch Tuesday fixes a remote code execution vulnerability that cybercriminals have been actively exploiting in ongoing...
Aug 11, 20231 min read
Â
Â


EvilProxy phishing campaign targets 120,000 Microsoft 365 users
EvilProxy, has quickly risen to become one of the most popular phishing as a service platforms used by cybercriminals to target Multi...
Aug 11, 20232 min read
Â
Â


Warning as old email accounts with weak security hacked by cyber criminals
Police are encouraging people to improve their cyber security following a spate of hackings of old email accounts. With email service...
Jul 14, 20232 min read
Â
Â


Cl0p – Ransomware and threat actor group
The MOVEit cyber-attack has continued to grow with more victims being affected everyday with an estimated 257 organisations and...
Jul 14, 20234 min read
Â
Â


Introduction to Active Cyber Defence
In an increasingly interconnected world, the threat landscape for cyber-attacks continues to evolve. As technology advances, so do the...
Jul 14, 20233 min read
Â
Â


Ransomware activity continues to surge despite crypto crime dropping to 62%
Funds flowing into known criminal cryptocurrency accounts were down 65% in the first half of 2023 in comparison to the same period in...
Jul 14, 20232 min read
Â
Â


What does your digital footprint say about you?
Each one of us has a digital footprint – the data that is left behind whenever you use a digital service. Whether you access the internet...
Jul 14, 20233 min read
Â
Â


School Resources for Education: Part 2
Schools have an increasing reliance on IT and online systems which makes cyber security an important consideration. As a result, a number...
Jun 13, 20233 min read
Â
Â


School Resources for Education: Part 1
Schools have an increasing reliance on IT and online systems which makes cyber security an important consideration. As a result, a number...
Jun 13, 20232 min read
Â
Â


New free NCSC Supply Chain Security E-learning packages available!
Cyber-attacks resulting from vulnerabilities within the supply chain can result in devastating, expensive and long-term ramifications for...
Jun 13, 20232 min read
Â
Â


MOVEit vulnerability and Zellis data extortion incident
Information about the MOVEit vulnerability that has affected Zellis and its customers, including actions for affected individuals and...
Jun 13, 20232 min read
Â
Â
bottom of page
