Articles
Closing the chapter on Windows 10 and upgrading to Windows 11
Once upon a time, Microsoft promised that Windows 10 would be ‘the last version of Windows’ but alas, it was not to be. October 14, 2025 marks the end of Windows 10 support, meaning…
The dangers of deepfakes
With the rise in use of Artificial Intelligence across all areas of life, there has also been a rise in its malicious usage.
Critical vulnerabilities in remote access tools expose industrial networks to cyber threats
Claroty’s Team82 recently discovered a critical vulnerability in industrial networks: the widespread use of insecure remote access tools (RATs) in Industrial Control Systems (ICS) and Operational…
North Korea aggressively targeting crypto industry with well-disguised social engineering attacks
North Korea is currently conducting an aggressive campaign against the crypto industry using well-disguised social engineering attacks.
Russian military cyber actors target U.S. and global critical infrastructure
The UK, alongside nine international allies, has publicly attributed a campaign of malicious cyber activity to Russia’s GRU Unit 29155.
Tropic Trooper spies on government entities in the Middle East
An Advanced Persistent Threat group, Tropic Trooper, launched an attack against a middle eastern government entity – although thought to have started in June 2023, it was only discovered in August…
Out of Office, Not out of Risk: Why Nearly Half of All Cyberattacks Happen After Hours
This article will explore the threat landscape of out of hours attacks and how to mitigate and create a resilient 24/7 business.
How a SOC Can Help SME’s Punch Above Their Weight in Cybersecurity
In this must-read breakdown, discover why hackers are targeting SMEs, the high price of unprotected data, and how a 24/7 Security Operations Centre could be the game-changer your business needs to…