Risk management and
cybersecurity blog

New Spring4Shell vulnerability CVE-2022-22963 and CVE-2022-22965

New Spring4Shell vulnerability: CVE-2022-22963 and CVE-2022-22965

Spring4Shell – a new zero-day vulnerability which affects Spring users It’s the second critical bug that has been identified on ...
Read More
What helps protect from spear phishing emails scam

Phishing emails and what helps protect from spear phishing

What is spear phishing? Spear phishing is defined as the fraudulent practice of sending emails ostensibly from a known or ...
Read More
Okta cyber attack: cloud security Supply chain attacks

Okta cyber attack: Supply chain attacks on the rise

Analysing Okta cyber attack and what you should do if your business has been affected Organisations that use Okta to ...
Read More
Paper with Indicator of Attack (IOAs) and Indicator of Compromise (IOCs)

Mitigating cyberattacks with IOAs and IOCs

IOA and IOC – what’s the difference and why you should pay attention to them Being able to mitigate cyberattacks ...
Read More
The Rise of Ransomware as a Service

The Rise of Ransomware as a Service

Ransomware as a service – what is it and how to prevent it? Ransomware attacks have more than doubled in ...
Read More
Define sensitive data and how to protect it

How to define sensitive data and the means of protecting it 

What is sensitive data, how do you define it and how to protect it A report revealed that in ...
Read More
Breaking down new SEC rules on cybersecurity risk management

Breaking down new SEC rules on cybersecurity risk management

What are the new SEC rules on cybersecurity risk management disclosure? The Securities and Exchange Commission (SEC) has introduced new ...
Read More
Top 3 Ransomware Examples and what can we learn from them

Top 3 Ransomware Examples and what can we learn from them

Ransomware attacks have become a significant threat to businesses worldwide. As organisations adopt remote working models to accommodate WFH, they expose ...
Read More
Understanding the cyber risks of the LDAP protocol

Understanding the cyber risks of the LDAP protocol

The Lightweight Directory Access Protocol (LDAP protocol) is an open, vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory ...
Read More