
How to protect yourself and your business from identity theft & fraud
Since the very first lockdown on March 26th, 2020, online fraud, identity theft, and cyber-attacks have increased. The five things every person, company, and organisation

Since the very first lockdown on March 26th, 2020, online fraud, identity theft, and cyber-attacks have increased. The five things every person, company, and organisation

Cybercriminals see businesses that fail to train their employees on cybersecurity as an opportunity to exploit. Hackers can gain access and infiltrate your systems through means that appear legitimate if they can obtain details or information from your employees.

Brute force attacks have been taking place for many years, and while the techniques are widely known, many companies and individuals remain vulnerable to them. Here we look at brute force penetration and what companies and their workers can do to protect themselves.

Authenticating access to any account, network, or application is a vital process. Traditionally this has been achieved with a username and password. However, passwords can be weak and offer poor cybersecurity, putting companies, customers, and data at severe risk.

What is credential stuffing & how does it work? Credential stuffing is a ‘brute force attack’ that uses bots to automatically inject combinations of usernames

As a penetration tester, you know more about vulnerabilities, not just for companies but personally. You know how easy it is for cyber attackers to access and collect personal information, a process known as data harvesting.

According to the 6th annual edition of the Cybersecurity Breaches Survey 2021 highlighting the risks, frequency, and business attitudes towards cybersecurity in the UK, the

Over the years, many sizeable well-known household name companies have fallen victim to cyber attackers, including many large players that you may not have heard

Today we take a look at some of the most significant cybersecurity incidents of 2020, their impact, and the steps your organisation can take to

Insufficient logging and monitoring is number ten on OWASP’s list of most critical web application and internet security risks. OWASP states that insufficient logging and

Of all the cybersecurity weaknesses, using components with known vulnerabilities is perhaps the easiest to understand. Although this weakness is widespread, it is somewhat easy

Ransomware is a severe cybersecurity threat that results in significant damage and costs. Here we take a look at what ransomware is and answer the

Polish video game maker CD Projekt confirmed that they were victims of a targeted cyber attack, compromising internal systems. The company, which is known for

Continuing our series of articles helping business leaders understand cybersecurity threats, we take a look at insecure deserialisation. What is insecure deserialisation? According to OWASP:

Today we take a look at cross-site scripting, explaining what it is, the dangers it presents, and how to find and test for vulnerabilities, all