We specialise in IT Security Solutions from Design to Back-end Storage and Hosting, and focusing on the audit, compliance, training, testing and protection of IT Infrastructure and Data Security to help protect your business and prevent you from getting hacked or your data breached.
Subscribe to our Security Newsletter here - we promise no SPAM just updates on how the world around is turning.
Rockstar Games has suffered a data breach linked to a recent security incident at Anodot, with the ShinyHunters extortion gang now leaking t…
Read more → 13 Apr 2026The FBI Atlanta Field Office and Indonesian authorities have dismantled the "W3LL" global phishing platform, seizing infrastructure and arre…
Read more → 13 Apr 2026OpenAI is rotating potentially exposed macOS code-signing certificates after a GitHub Actions workflow executed a malicious Axios package du…
Read more → 13 Apr 2026Dutch fitness giant Basic-Fit announced that hackers breached its systems and gained access to information belonging to a million of its cus…
Read more → 13 Apr 2026A critical vulnerability in the wolfSSL SSL/TLS library can weaken security via improper verification of the hash algorithm or its size when…
Read more → 13 Apr 2026A nascent Android remote access trojan called Mirax has been observed actively targeting Spanish-speaking countries, with campaigns rea…
Read more → 14 Apr 2026OX Security recently analyzed 216 million security findings across 250 organizations over a 90-day period. The primary takeaway: while …
Read more → 14 Apr 2026Cybersecurity researchers have discovered a new campaign in which a cluster of 108 Google Chrome extensions has been found to communicate wi…
Read more → 14 Apr 2026A critical security vulnerability impacting ShowDoc, a document management and collaboration service popular in China, has come under a…
Read more → 14 Apr 2026The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added half a dozen security flaws to its Known Exploited Vulnerab…
Read more → 14 Apr 2026New advisory warns cyber threat group APT28 have exploited vulnerable edge devices to support malicious operations.…
Read more → 07 Apr 2026Russian cyber actor APT28 exploit vulnerable routers to hijack DNS, enabling adversary‑in‑the‑middle attacks and theft of passwords and auth…
Read more → 07 Apr 2026The NCSC has issued actions for individuals at risk of targeted attacks against messaging apps.…
Read more → 31 Mar 2026The NCSC is encouraging UK organisations to mitigate an unauthenticated remote code execution vulnerability affecting F5 BIG-IP Access Polic…
Read more → 30 Mar 2026UK organisations encouraged to take immediate action to mitigate two recently disclosed vulnerabilities affecting Citrix NetScaler ADC and C…
Read more → 25 Mar 2026Last week, I wrote about attackers scanning for various webshells, hoping to find some that do not require authentication or others that us…
Read more → 13 Apr 2026I spotted an interesting piece of JavaScript code that was delivered via a phishing email in a RAR archive. The file was called  
Read more → 10 Apr 2026Phone: +44(0)1905 886233
E-mail: