top of page
Search


New critical authentication bypass bug in Ivanti MobileIron Core
Invanti have recently disclosed a new critical vulnerability in their MobileIron Core mobile device management software. CVE-2023-35082...
Aug 11, 20231 min read
Â
Â


Introduction to Active Cyber Defence
In an increasingly interconnected world, the threat landscape for cyber-attacks continues to evolve. As technology advances, so do the...
Jul 14, 20233 min read
Â
Â


DNS data shows one in ten organisations have malware traffic on their networks
Research has been conducted by Akamai around Command and control (C2) traffic to understand prevalent threats in corporate and home...
Apr 19, 20232 min read
Â
Â


Legacy Email Security Risk! – Do you have a legacy email account or one that has not been secured?
There are many email security challenges caused by legacy email account providers, but we are here to help you determine the best...
Apr 19, 20232 min read
Â
Â


‘Cyber Essentials’ What is it and who is it for?
Cyber Essentials is a simple but effective government-backed scheme that will help protect organisations, whatever the size, against a...
Jul 21, 20222 min read
Â
Â


Are you prepared for the long haul on Russia-Ukraine?
The NCSC assesses the cyber threat to the UK as a result of the conflict remains heightened and organisations are urged to not let their...
Jul 7, 20221 min read
Â
Â
bottom of page