Phishing – ‘Is It Still One of The Biggest Cyber Threat?’

New research shows the prevalence of email phishing as the top cyber threat, tricking firms into revealing information through reputable sender disguises.
The Secret to Google’s Security, find out more here

Google’s very impressive record: Zero successful phishing attacks on a massive workforce of 140,000+ employees. Discover their security success story.
The enquiry ordered into GCHQ’s Deal with US Amazon

“Online US retail giant Amazon has used its cloud operations to do a deal with the GCHQ, MI5, and MI6, The Financial Times reports.
Pentest Files: Error Messages And Cloud Access Keys

Welcome to our Pentest Files blog series. Each blog post will present an interesting or dangerous finding one of our testers has identified in an actual recent pen-test, so you […]
Who Does Social Engineering Target And Why Does It?

Protecting the data, valuables and account information related to your business has become even more vital as our workplaces have become more dispersed, remote and reliant on the cloud, and […]
Understanding Pentest Vs Vulnerability Scanning: A Guide

Because so much of life is carried out online these days, it’s essential that you take all the necessary steps to protect your business interests – and this includes ensuring […]
Cloud Hesitancy in Cyber – Why do people question it?

The myths surrounding cloud security hesitancy. Gain clarity on common misconceptions and make informed decisions about cloud-based security solutions.
Computer Hacker Gains Access to Florida City’s Water Supply

A computer hacker in the US was able to gain access to the water system of Oldsmar in Florida and successfully increased the amount of sodium hydroxide.
Is it true, do Macs get infected with malware more easily?

Apple claims that its Mac computers are well protected by in-built antivirus features, and there is no need to worry about extra security – how true is this?
File upload tricks and checklist

A compilation of tricks and checks for when a file upload is encountered in an offensive security test.