Business Email Compromise: Preventative and Remedial Measures
At the Cyber and Fraud Centre, we provide an Incident Response Helpline to support organisations that have fallen victim to cyber attacks or financial fraud. One…
At the Cyber and Fraud Centre, we provide an Incident Response Helpline to support organisations that have fallen victim to cyber attacks or financial fraud. One…
What is Log4j? Log4j is a small piece of free software often used on apps and servers to record or log activity. These logs can…
With the popularity of smart products on the rise with projected exponential growth, the UK government is looking to create a legal framework of how…
On Friday the 10th of December 2021, a zero-day was identified in the Apache Log4j 2 library, a common logging utility featured in applications and services built…
What is it? The micro exercise session combines several fundamental aspects of cyber security with additional, broader cyber security learnings within a 90-minute session to…
What is it? Ransomware is some of the most destructive forms of malware currently in circulation. It has the capability to bring entire organisations to…
Alison Stone, Third Sector Cyber Resilience Co-ordinator shares why those in the charity or voluntary sector should invest time in their cyber resilience.
Ethical hacker Suzie examines what we know so far on the NSO’s Pegasus spyware.
SBRC ethical hacker Suzie explains the Microsoft Print Spooler vulnerability.