We specialise in IT Security Solutions from Design to Back-end Storage and Hosting, and focusing on the audit, compliance, training, testing and protection of IT Infrastructure and Data Security to help protect your business and prevent you from getting hacked or your data breached.
Subscribe to our Security Newsletter here - we promise no SPAM just updates on how the world around is turning.
Backups don't fail because they're missing, they fail because attackers destroy them first. Acronis explains how ransomware targets backup s…
Read more → 06 May 2026Cisco patched a Crosswork Network Controller and Network Services Orchestrator denial-of-service vulnerability that requires manually reboot…
Read more → 06 May 2026Disc Soft Limited, the maker of DAEMON Tools Lite, confirmed that the software had been trojanized in a supply chain attack and released a n…
Read more → 06 May 2026A phishing campaign delivered through Google sponsored search results is targeting credentials for ManageWP, GoDaddy's platform for managing…
Read more → 06 May 2026A critical vulnerability in the popular Node.js sandboxing library vm2 allows escaping the sandbox and executing arbitrary code on the host …
Read more → 06 May 2026A dozen critical security vulnerabilities have been disclosed in the vm2 Node.js library that could be exploited by bad actors to break out …
Read more → 07 May 2026Cybersecurity researchers have exposed a new Mirai-derived botnet that self-identifies as xlabs_v1 and targets internet-exposed devices runn…
Read more → 06 May 2026The Iranian state-sponsored hacking group known as MuddyWater (aka Mango Sandstorm, Seedworm, and Static Kitten) has been attributed to a ra…
Read more → 06 May 2026For nearly 20 years, we at The Hacker News have mostly told scary stories about cyberspace — big hacks, broken systems, and new threats. But…
Read more → 06 May 2026Analysts recently confirmed what identity security teams have quietly feared: AI agents are being deployed faster than enterprises can gover…
Read more → 06 May 2026Passkeys are the more secure and user-friendly login method and should be the default authentication option for consumers.…
Read more → 23 Apr 2026New advisory highlights how to defend against attacker tactics believed to be used by China-linked actors to hide malicious cyber activity.…
Read more → 23 Apr 2026Organisations should map and baseline their edge device traffic, especially VPN and remote access connections, and adopt dynamic threat feed…
Read more → 23 Apr 2026Explaining the widespread shift in tactics, techniques and procedures (TTPs) towards networks of compromised infrastructure, and how to defe…
Read more → 23 Apr 2026SilentGlass, a plug-and-play device, actively blocks any unexpected or malicious HDMI and Display Port connections.…
Read more → 22 Apr 2026[This is a Guest Diary by Eric Roldan, an ISC intern as part of the SANS.edu BACS program]
…
Read more → 07 May 2026Yup, that is for real.
…
Read more → 05 May 2026I just got an email from SSL.com last night, they are rotating &#;x26;#;xc2;&#;x26;#;xa0…
Read more → 05 May 2026Phone: +44(0)1905 886233
E-mail: