Protecting Your Organisation After a Ransomware Attack

So, here is the scenario: you’re sitting at your desk working away and suddenly realise [...]

Best Antivirus Software. Are You Sure?

If only it were as simple as the popular ‘XYZ’ Antivirus (AV) software solution is [...]

A File Manager Plugin in WordPress Contains Multiple Critical Vulnerabilities

Several vulnerabilities have been discovered in the Frontend File manager plugin in WordPress, which allows [...]

Linux Variant of REvil Ransomware Targets VMware’s ESXi, NAS Devices

REvil ransomware producers have ported their malware over to Linux to expand their campaigns. The [...]

12 Critical Policies for SOC 2 Compliance

If you are considering getting your organisation SOC 2 compliant, this blog should be an [...]

How Long Does SOC 2 Compliance Take and How Can You Get Certified?

It seems like a long project to reach SOC compliance, right? Well, not if you [...]

Why Cyber Essentials is Not Just a Tick Box – Interview with Dr Emma Philpott

As the question ‘why do I need a Cyber Essentials certification?’ continues to arise, Dr [...]

“Kite in a Storm” Web Administrator to Remote Code Execution

Researchers at ZX Security discovered a chain of vulnerabilities that ends with Remote Code Execution [...]

Join Us At The Big CISO 360 Event

Don’t leave without reading about this invigorating event hosted by Pulse Conferences celebrating the 5th [...]

Millions of Connected Cameras Open to Eavesdropping on IoT Camera Feeds

A supply-chain component contains a critical impact vulnerability that allows a remote attacker to eavesdrop [...]

Risk Crew