Skip to main content

Blog

7th October 2025

What is a rootkit?

Hard to detect and potentially very dangerous, are you prepared to counteract this type of malware?Malware based attacks, particularly those coming from phishing emails, are…

2nd October 2025

What is SQL injection?

How could your systems be tricked into executing unintended commands?To understand how this attack works, first we need to understand how SQL works. SQL, or Structured Query…

1st October 2025

What is cross-site scripting (XSS)?

How could you be infected with malicious code and not even know it?Cross-site scripting (XSS) is a vulnerability that allows attackers to inject malicious scripts into web pages…

29th September 2025

What is a man-in-the-middle attack?

Could cyber criminals be intercepting your communications?A man-in-the-middle (MitM) attack refers to when a bad actor secretly intercepts or alters communications between two…

25th September 2025

What can your security team see on your work devices?

We’re keeping an eye out for cyber threats, but that means we can see when you’re slacking too!You may not always remember it, but security teams are constantly monitoring your…

23rd September 2025

The Salesloft Drift data breach: what happened?

Discover how one attack impacted over 700 organisations.In August of 2025, Salesloft – a company that provides tools to help sales teams manage relationships with their customers…

19th September 2025

What are drive-by download attacks?

How could visiting the wrong website compromise your cyber security?Most of the time, you have to do something to infect your systems with malware. You might click on a link in a…

17th September 2025

Bankrupt: how cyber attacks can devastate businesses (part 2)

Some cyber attacks could take down your business not just for a day, but permanently.We’re back, with more cyber security incidents that were so damaging, they sunk businesses.…

15th September 2025

Bankrupt: how cyber attacks can devastate businesses (part 1)

With some attacks, there is no coming back.Most cyber attacks are bad, but not fatal. Hackers may extort some money through ransomware, or leak some user information, but most…

Back to top