Electronic payments have changed dramatically over the past few decades, with payment card transactions becoming integral to our daily lives. However, with the convenience of payment cards comes the increased risk of cyber threats and data breaches. Threat actors often find new ways to access sensitive payment card data, and businesses of all sizes are […]
find out moreWith cybersecurity threats becoming increasingly common and sophisticated over the years, you may be using software vulnerable to CVE 2021 44228 without ever realising it. Most people usually give little thought to installing security updates and patches on their computers and other devices. After all, installation of these security updates might take a while. In […]
Find out moreIn today’s world, technology has become a vital part of every organisation, regardless of its size or industry. With this technology comes the risk of vulnerabilities that cybercriminals can exploit to steal sensitive information, disrupt business operations, and cause financial losses. Patch management is a crucial part of any cybersecurity strategy that minimises these risks […]
Find out moreFor protecting endpoints such as workstations and servers, antivirus protection has been the traditional go-to. However, with Endpoint Protection and Response (EDR), next-generation protection is available to organisations.
Find out moreThe CL0P ransomware group claimed responsibility for the attack on UK-based utility provider South Staffordshire Water. However, they have said there is no impact on the water supply or drinking water safety.
On its extortion website, CL0P uploaded a vast collection of stolen papers. These included passport scans, spreadsheets with administrator passwords, drivers’ licences, and, concerningly, screenshots of administration interfaces of wastewater treatment systems.
Find out moreWhat is CRING ransomware? In April 2021, Sapphire’s threat intelligence resources identified a sophisticated ransomware campaign utilising the Cring malware and leveraging vulnerability (CVE-2018-13379), identified in 2019, affecting Fortinet VPN Servers. The cring ransomware attack allowed a threat actor to connect to the VPN appliance without authentication and download session files containing usernames and passwords […]
Find out moreIn November 2021, we published a blog post about the virtues of ISO27001 certification, ‘ISO27001 Certification: Now is the Time to Consider the Benefits’. Now with the publication of the ISO27002 controls, the changes are a great step forward for many organisations, and the reasons are outlined below…
Find out moreOn January 24th 2022, the NCSC (National Cyber Security Centre) and IASME implemented an updated set of requirements for Cyber Essentials. This update is the most significant overhaul of the scheme’s technical controls since it launched in 2014. The change comes in response to the cybersecurity challenges organisations have faced in the last seven years to ensure the […]
Find out moreISO 27001 is a standard set out by the International Standards Organisation that helps your organisation to manage the security of your information assets (electronic/paper, reputational, applications, infrastructure, third parties, etc.). Additionally, the certification helps organisations formulate an Information Security Management System (ISMS) to mitigate the growing number of information and cyber attacks.
Find out moreOWASP selected eight of the ten categories from contributed data and two categories from the Top 10 community survey at a high level. AppSec (Application security) researchers attempt to find new vulnerabilities and new ways to test for them. Because of the nature of the testing, it takes time to integrate these tests into tools and processes.
Find out moreDuring the worst of the covid crisis, organisations implemented many security strategies to deal with the new way of working in the short term. Therefore, they executed them as one-off projects to cover all bases. However, after covid lockdowns, organisations have found a need for long-term strategies for cyber security.
Find out moreA cybersecurity incident response team (also known as CSIRT) is a team of cybersecurity experts available to deal with an incident occurring in an organisation. The team can be either internal or external, this depends on the nature of the incident and whether the team is equipped to deal with it effectively.
Find out more