Blog

Image deppicting the NCSC Cyber Assessment Framework

Enhancing Your CAF Compliance with MITRE ATT&CK

Strengthening UK Cyber Resilience In today's ever-evolving cyber landscape, organisations across the UK are grappling with the critical need to ...

Packet Pandemonium! Smurf vs. Fraggle and How to Keep Your Network Shipshape

Honestly, I can't help but crack a smile whenever these particular cyber-attacks crop up in conversation. Maybe it's a touch ...
Demystify DDoS attacks

DDoS Demystified: Unpacking the Digital Siege That Many Misunderstand

Today I am going talk about something that gets mentioned a fair bit in the digital ether, yet often remains ...

The Curious Case of the Birthday Paradox: More Than Just a Party Trick

We've all heard the pub quiz classic: "How many people do you need in a room to have a 50% ...

Zero Trust: When Even Your Mate Needs a Second Look (And Why That’s a Good Thing)

Gather 'round, folks, and let's have a bit of a dive on something that sounds a bit like a trust ...

2023: A Cyber-Calamity in Review – Or, “Blimey, Did All That Happen?”

Settle in, put the kettle on, and perhaps grab a biscuit or two, because 2023 was an absolute humdinger of ...

Impregnable Mac? MacStealer wants a word.

Right then, let's have a look at this "MacStealer" malware, shall we? Seems even the shiny, supposedly impenetrable world of ...

Black Basta: The Ransomware Gang Causing a Right Old Stir

If you've been keeping an eye on the cyber news, you've likely heard the name Black Basta. They're a ransomware ...

The Capita Breach: What You Need to Know

You might have heard whispers, or perhaps even seen the headlines, but the cyberattack on Capita in April 2023 was ...