Risk management and
cybersecurity blog
New Spring4Shell vulnerability: CVE-2022-22963 and CVE-2022-22965
Spring4Shell – a new zero-day vulnerability which affects Spring users It’s the second critical bug that has been identified on ...
Read More
Phishing emails and what helps protect from spear phishing
What is spear phishing? Spear phishing is defined as the fraudulent practice of sending emails ostensibly from a known or ...
Read More
Okta cyber attack: Supply chain attacks on the rise
Analysing Okta cyber attack and what you should do if your business has been affected Organisations that use Okta to ...
Read More
Mitigating cyberattacks with IOAs and IOCs
IOA and IOC – what’s the difference and why you should pay attention to them Being able to mitigate cyberattacks ...
Read More
The Rise of Ransomware as a Service
Ransomware as a service – what is it and how to prevent it? Ransomware attacks have more than doubled in ...
Read More
Breaking down new SEC rules on cybersecurity risk management
What are the new SEC rules on cybersecurity risk management disclosure? The Securities and Exchange Commission (SEC) has introduced new ...
Read More
Top 3 Ransomware Examples and what can we learn from them
Ransomware attacks have become a significant threat to businesses worldwide. As organisations adopt remote working models to accommodate WFH, they expose ...
Read More

New Spring4Shell vulnerability: CVE-2022-22963 and CVE-2022-22965
Spring4Shell – a new zero-day vulnerability which affects Spring users It’s the second critical bug that has been identified on ...
Read More
Read More

Phishing emails and what helps protect from spear phishing
What is spear phishing? Spear phishing is defined as the fraudulent practice of sending emails ostensibly from a known or ...
Read More
Read More

Okta cyber attack: Supply chain attacks on the rise
Analysing Okta cyber attack and what you should do if your business has been affected Organisations that use Okta to ...
Read More
Read More

Mitigating cyberattacks with IOAs and IOCs
IOA and IOC – what’s the difference and why you should pay attention to them Being able to mitigate cyberattacks ...
Read More
Read More

The Rise of Ransomware as a Service
Ransomware as a service – what is it and how to prevent it? Ransomware attacks have more than doubled in ...
Read More
Read More

Breaking down new SEC rules on cybersecurity risk management
What are the new SEC rules on cybersecurity risk management disclosure? The Securities and Exchange Commission (SEC) has introduced new ...
Read More
Read More

Top 3 Ransomware Examples and what can we learn from them
Ransomware attacks have become a significant threat to businesses worldwide. As organisations adopt remote working models to accommodate WFH, they expose ...
Read More
Read More