Understanding Microsofts latest changes – passwords?

Explore the risks businesses face with internet-stored data and the prevalent distrust in online security, highlighting the need for robust protection.
Deep dive: The Enquiry Ordered Into GCHQ’s Deal With Amazon

Online US retail giant Amazon has used its cloud operations to do a deal with the GCHQ, MI5, and MI6, The Financial Times (FT) reports. This has raised concerns over how data […]
When Sony BMG Exposed Millions To Malware Attacks and Why

Sony is a gigantic multipartite corporation that has been prone to multiple different types of hacks, find out why and how they improve their security posture
The Secret to Google’s Security, you can find out here

Catch Of The Week Did you know that Google has never been the victim of a successful phishing attack? Not bad for a company of 140,000 staff and counting. 2021 saw the amount of phishing […]
Info – CVE-2021-44228: Apache log4j Remote Code Execution

CVE-2021-44228: A new high profile zero-day vulnerability affecting large number of Java applications through a vulnerable version of the widely-used library Apache log4j.
Phishing – ‘Is It Still One of The Biggest Cyber Threat?’

New research shows the prevalence of email phishing as the top cyber threat, tricking firms into revealing information through reputable sender disguises.
The Secret to Google’s Security, find out more here

Google’s very impressive record: Zero successful phishing attacks on a massive workforce of 140,000+ employees. Discover their security success story.
The enquiry ordered into GCHQ’s Deal with US Amazon

“Online US retail giant Amazon has used its cloud operations to do a deal with the GCHQ, MI5, and MI6, The Financial Times reports.
Pentest Files: Error Messages And Cloud Access Keys

Welcome to our Pentest Files blog series. Each blog post will present an interesting or dangerous finding one of our testers has identified in an actual recent pen-test, so you […]
What Was The First Ransomware Virus And Its Importants?

One of the biggest growing problems in computer security is the growing proliferation of cyberattacks which are far more open and threatening in nature.