Blog

Enhancing Your CAF Compliance with MITRE ATT&CK

In today's ever-evolving cyber landscape, organisations across the UK are grappling with the critical need to bolster their cyber resilience ...

Packet Pandemonium! Smurf vs. Fraggle and How to Keep Your Network Shipshape

Honestly, I can't help but crack a smile whenever these particular cyber-attacks crop up in conversation. Maybe it's a touch ...
Demystify DDoS attacks

DDoS Demystified: Unpacking the Digital Siege That Many Misunderstand

Today I am going talk about something that gets mentioned a fair bit in the digital ether, yet often remains ...

The Curious Case of the Birthday Paradox: More Than Just a Party Trick

We've all heard the pub quiz classic: "How many people do you need in a room to have a 50% ...

Zero Trust: When Even Your Mate Needs a Second Look (And Why That’s a Good Thing)

Gather 'round, folks, and let's have a bit of a dive on something that sounds a bit like a trust ...

2023: A Cyber-Calamity in Review – Or, “Blimey, Did All That Happen?”

Settle in, put the kettle on, and perhaps grab a biscuit or two, because 2023 was an absolute humdinger of ...

Impregnable Mac? MacStealer wants a word.

Right then, let's have a look at this "MacStealer" malware, shall we? Seems even the shiny, supposedly impenetrable world of ...

Black Basta: The Ransomware Gang Causing a Right Old Stir

If you've been keeping an eye on the cyber news, you've likely heard the name Black Basta. They're a ransomware ...

The Capita Breach: What You Need to Know

You might have heard whispers, or perhaps even seen the headlines, but the cyberattack on Capita in April 2023 was ...