Cyber Security Airstrike Attack: breaking into a locked domain-joined laptop (CVE-2021-28316)

On Wednesday 14th of April, Matthew Johnson, one of our senior security consultants released details of a new wireless-based attack dubbed... Read more

Cyber Security Here’s how you can bolster your defences against an APT attack

To be “slow and low” is an Advanced Persistent Threat (APT) signature. Unnoticed, they penetrate security walls and find their way into networks and... Read more

Cyber Security Do you believe what you see?

What used to be an internet oddity has developed into a widely destructive political and social force: Deepfakes. They have become one of the most... Read more

Cyber Security The end of trust?

Trust no-one! The ‘Zero Trust’ approach sets up a framework within cyber security that makes one huge assumption: don’t trust anyone who is accessing... Read more

Cyber Security Why cyber security is not just the IT department's job

When it comes to cyber security threats, the obvious ones are still lurking (phishing threats and ransomware, for example). However, the increase in... Read more

Cyber Security On the hunt: Finding 8 vulnerabilities in 8 weeks

Jack Misiura, our Application Security Consultant, has detected eight zero-day vulnerabilities in recent weeks and he’s got a whole lot more in the... Read more

News Proofpoint and CyberArk join forces to protect your VAP

Proofpoint, a leading cyber security and compliance company, recently announced it is extending its partnership with CyberArk, a global leader in... Read more

Cyber Security Don't fall victim to these 6 cloud attacks

Hybrid cloud environments experience the highest number of cyberattacks. Read more

Cyber Security How to save your organisation from long-term damage

It’s no secret that organisations of all sizes face the threat of cyber security attacks. Read more

Cyber Security Not all Red Teams are made the same

Red Team operations aren’t a standard cookie-cutter exercise. Every operation is tailored to achieve bespoke objectives while playing to the... Read more

Cyber Security Red Teaming and the origins of anonymous hacking

Red Teaming allows you to test your security, with zero fallout and is becoming an increasingly common strategy in organisations that really want to... Read more