Cyber Security Blog
Stay ahead of the curve with industry trends, cutting edge tech and inventive strategies.
Equilibrium Security Acquired by OmniCyber Security
We’re excited to share some news. Equilibrium Security has officially joined the OmniCyber Security family. After 13 years of building a company based on trust,
Case Study: Ransomware Attack Shuts Down a £9m SME
Every so often, something comes along that reminds us why we do what we do in Cyber Security. This case study is one of those
Jaguar Land Rover Hack – What Happened and Why It Matters
If you’ve followed the news this week, you’ll know that Jaguar Land Rover (JLR) — Britain’s biggest carmaker — has had to shut down production
Case Study: Lessons from a Modern XSS Cross Site Scripting Attack
We recently ran a web app pen test and found a flaw that proves old vulnerabilities are still alive and well in modern apps. The
How to Offer Cyber Essentials as an IT Provider
Your clients are under pressure to handle security risks and prove they’re secure. It could be a contract on the line, a cyber insurance renewal,
What is Adversarial Exposure Validation (AEV)?
If you’re responsible for your organisation’s Cyber Security, you’ve likely invested in a mix of tools — vulnerability scanners, EDR, firewalls, perhaps even regular penetration
Why Every Security Leader Needs to Master Threat Modelling
If you instinctively imagine worst-case scenarios, such as a developer reusing an old password or an endpoint being exposed during migration, you’re already thinking like
How RDP Self-Signed Certificates Can Be a Gift to Attackers
You’ve probably seen it, that familiar yellow warning when you connect to a Remote Desktop session: “The identity of the remote computer cannot be verified.
Cyber Incident Response: Putting Your Plan Into Action Part 2
If Part 1 helped you lay the groundwork for an effective incident response strategy, this next phase is all about making it work in the
How To Build An Incident Response Plan: A Simple Guide
When a cyber incident hits, very few people are sitting calmly flipping through a 60-page policy manual. Most are asking: “Who do I tell? What