We specialise in IT Security Solutions from Design to Back-end Storage and Hosting, and focusing on the audit, compliance, training, testing and protection of IT Infrastructure and Data Security to help protect your business and prevent you from getting hacked or your data breached.
Subscribe to our Security Newsletter here - we promise no SPAM just updates on how the world around is turning.
A new version of the CloudZ remote access tool (RAT) is deploying a previously unseen malicious plugin called Pheno that hijacks the Microso…
Read more → 05 May 2026The North Korean hacker group APT37 has been delivering an Android version of a backdoor called BirdCall in a supply-chain attack through a …
Read more → 05 May 2026A Latvian national extradited to the United States was sentenced to 8.5 years in prison for his "cold case" negotiator role in the Russian K…
Read more → 05 May 2026Hackers have been exploiting a critical vulnerability (CVE-2026-22679) in the Weaver E-cology office automation since mid-March to run disco…
Read more → 04 May 2026The Amazon Simple Email Service (SES) is being increasingly abused to send convincing phishing emails that can bypass standard security filt…
Read more → 04 May 2026While the software industry has made genuine strides over the past few decades to deliver products securely, the furious pace of AI adoption…
Read more → 05 May 2026The North Korea-aligned state-sponsored hacking group known as ScarCruft has compromised a video game platform in a supply chain espionage a…
Read more → 05 May 2026A critical security vulnerability in Weaver (Fanwei) E-cology, an enterprise office automation (OA) and collaboration platform, has come und…
Read more → 05 May 2026Microsoft has disclosed details of a large-scale credential theft campaign that has leveraged a combination of code of conduct-themed lures …
Read more → 05 May 2026An active phishing campaign has been observed targeting multiple vectors since at least April 2025 with legitimate Remote Monitoring and Man…
Read more → 04 May 2026Passkeys are the more secure and user-friendly login method and should be the default authentication option for consumers.…
Read more → 23 Apr 2026New advisory highlights how to defend against attacker tactics believed to be used by China-linked actors to hide malicious cyber activity.…
Read more → 23 Apr 2026Organisations should map and baseline their edge device traffic, especially VPN and remote access connections, and adopt dynamic threat feed…
Read more → 23 Apr 2026Explaining the widespread shift in tactics, techniques and procedures (TTPs) towards networks of compromised infrastructure, and how to defe…
Read more → 23 Apr 2026SilentGlass, a plug-and-play device, actively blocks any unexpected or malicious HDMI and Display Port connections.…
Read more → 22 Apr 2026I just got an email from SSL.com last night, they are rotating &#;x26;#;xc2;&#;x26;#;xa0…
Read more → 05 May 2026Summary
…
Read more → 04 May 2026This week, I will release a few updates to our DShield honeypot. The update should happen automatically if you have "automatic updates" ena…
Read more → 04 May 2026Phone: +44(0)1905 886233
E-mail: