Preparation is Key
This article was written and provided to the Scottish Business Resilience Centre by Catriona Garcia-Alis, Senior Associate, Dispute Resolution Team, CMS. I don’t remember the…
This article was written and provided to the Scottish Business Resilience Centre by Catriona Garcia-Alis, Senior Associate, Dispute Resolution Team, CMS. I don’t remember the…
Phishing attacks are one of the most common methods threat actors use to gain access to your network and devices. If you have an email…
Researchers at Mitiga, a cyber security incident response company, have uncovered threat actors targeting senior leaders, such as CEOs and CFOs, with specially crafted spear…
Description: The number of phishing attacks using legitimate software-as-a-service (SaaS) platforms has risen by 1100% since June 2021, according to a report published by Palo Alto Networks…
Apple has released security updates for a zero-day vulnerability that affects both the kernel and WebKit (Apple’s web browser engine that powers Safari) iOS devices and could…
Affected Systems: Networking devices containing Realtek’s RTL819x system on a chip. Description: Researchers from Faraday Security, a cyber security company based in Argentina, have released exploit…
Description: Microsoft’s Threat Intelligence Centre (MSTIC) has published the technical methods and activities relating to a Russian group tracked as SEABORGIUM. The blog details how the threat…
Description: The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have released an advisory detailing the actions of a newly…
Affected Systems: Zimbra Collaboration Suite Email Servers, versions older than Zimbra 8.8.15 patch 33 or Zimbra 9.0.0 patch 26. Description: A currently unknown threat actor…