Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Archives: Projects

Week In Review 25/01-29/01

Week In Review 25/01-29/01

The Week In Review 25/01 – 29/01 This week saw some large wins for law enforcement in the constant battle against cyber criminals. Emotet, dubbed the worlds most prolific and dangerous malware botnet, was taken offline as the result of a two-year-long global law enforcement operation. The FBI, Europol, and the UK’s NCA, were amongst the group […]

The Week In Review 18/01-22/01

The Week In Review 18/01-22/01

The Week In Review 18/01 – 22/01 Ransomware continues to dominate cyber headlines as we move further into 2021. Last year numerous multi-national companies fell victim to the cyber attack where the criminals attempt to sell companies back their own data that was stolen and encrypted during the attacks. However, it is not just large conglomerates that […]

The Week In Review 11/01-15/01

The Week In Review 11/01-15/01

The Week In Review 11/01 – 15/01 2020 was a good year for SaaS, but perhaps not the SaaS you are thinking of. A Scam-as-a-Service operation, codenamed Classiscam, uncovered in Russia has been helping classified ads scammers take more than $6.5m from buyers across multiple continents. The scammers used an organised model, deployed across various sites listing items such […]

Why A Red Team Exercise Delivers Results

Why A Red Team Exercise Delivers Results

Why a red team exercise delivers results Technology has changed the way businesses fundamentally operate and work in an interconnected world which has enabled organisations to be more productive, efficient and provide a wider range of services. Whilst overall this is a good thing, it has created a significant number of threats and increased risks […]

Security Testing – How to Choose the Right Provider

Security Testing – How to Choose the Right Provider

For most companies, it simply isn’t possible – or desirable – to rely solely on an in-house security team to conduct all testing exercises to provide the information security assurance your business needs. Building up and retaining the team can be costly and time-consuming, and in reality it’s often a better option to bring in […]

Contact Us

Contact Us Reach out to one of our cyber experts and we will arrange a call