
Protecting Your Organisation After a Ransomware Attack
So, here is the scenario: you’re sitting at your desk working away and suddenly realise [...]
Best Antivirus Software. Are You Sure?
If only it were as simple as the popular ‘XYZ’ Antivirus (AV) software solution is [...]
A File Manager Plugin in WordPress Contains Multiple Critical Vulnerabilities
Several vulnerabilities have been discovered in the Frontend File manager plugin in WordPress, which allows [...]
Linux Variant of REvil Ransomware Targets VMware’s ESXi, NAS Devices
REvil ransomware producers have ported their malware over to Linux to expand their campaigns. The [...]
12 Critical Policies for SOC 2 Compliance
If you are considering getting your organisation SOC 2 compliant, this blog should be an [...]
How Long Does SOC 2 Compliance Take and How Can You Get Certified?
It seems like a long project to reach SOC compliance, right? Well, not if you [...]
Why Cyber Essentials is Not Just a Tick Box – Interview with Dr Emma Philpott
As the question ‘why do I need a Cyber Essentials certification?’ continues to arise, Dr [...]
“Kite in a Storm” Web Administrator to Remote Code Execution
Researchers at ZX Security discovered a chain of vulnerabilities that ends with Remote Code Execution [...]
Join Us At The Big CISO 360 Event
Don’t leave without reading about this invigorating event hosted by Pulse Conferences celebrating the 5th [...]
Millions of Connected Cameras Open to Eavesdropping on IoT Camera Feeds
A supply-chain component contains a critical impact vulnerability that allows a remote attacker to eavesdrop [...]