top of page
Stephen Parsons
Apr 18, 20234 min read
Evide hack shows how we must take third-party security management more seriously
This week, another hack effecting vulnerable end users in Ireland and the UK will have caused a great deal of stress and anxiety for the...
Stephen Parsons
Jan 13, 20232 min read
The trouble with Excel based Cyber Risk Management
The drawbacks of using Excel to manage your cyber risk register. Many organisations use Excel to manage their cyber risk register. ...
Stephen Parsons
Dec 12, 20221 min read
How to create secure passwords
A secure password is typically one that is long, random, and complex. Here are some tips for creating a secure password: Use a mix of...
Rachel Hanlon
Dec 13, 20211 min read
Critical Zero-day vulnerability in Apache Log4j Java library
Description Security researchers has discovered a new zero-day vulnerability dubbed Log4Shell in Apache Log4j Java-based logging library...
Megan Haybyrne
Nov 23, 20211 min read
1.2 million Customer Accounts affected by GoDaddy Breach
Description Security Researchers have discovered that the Web hosting company GoDaddy has been hacked and 1.2 million customer accounts...
Rachel Hanlon
Nov 19, 20211 min read
Iranian APT Observed Targeting Fortinet and Microsoft Exchange Vulnerabilities
Description FBI and CISA observed Iranian APT targeting Fortinet and Microsoft exchange vulnerabilities to gain access to vulnerable...
Rachel Hanlon
Oct 18, 20211 min read
A Harvester Group targeting Telcos, government&IT sector has been discovered by security researchers
Description Harvester group is targeting telecommunications, government, and information technology sectors by using custom backdoor to...
Rachel Hanlon
Oct 5, 20212 min read
Cost of Ransomware Breach
Ransomware is a form of malware or virus that encrypts a victim’s files. The attacker then demands a ransom from the victim to restore...
Rachel Hanlon
Sep 21, 20211 min read
A patch has been released by VMware for the critical vulnerability in vCenter Server
Description VMware released a patch for multiple vulnerabilities in VMware vCenter Server and VMware Cloud Foundation including arbitrary...
Rachel Hanlon
Sep 20, 20211 min read
Ransomware Attacks
What is Ransomware It’s is a form of malware or virus that encrypts a victim's files. The attacker then demands a ransom from the victim...
Megan Haybyrne
Sep 13, 20211 min read
How do Cyber Attacks Work?
Cyberattacks can differ in many ways such as type of attack, size and results. However, there is a basic structure that cyber criminals...
bottom of page