
What is a Credential Stuffing Attack?
If you’ve ever had an account on a website affected by a data breach, then chances are your credentials may be used in credential-stuffing attacks….
If you’ve ever had an account on a website affected by a data breach, then chances are your credentials may be used in credential-stuffing attacks….
What is it? Charities, small businesses, and public sector organisations hold as much sensitive data as large organisations but rarely have the same resources for…
A new IT security training workshop launched today will give organisations the tools to protect themselves against the reputational risk associated with data leaks. The…
Do you believe in protecting organisations through cyber security? Who we are Scottish Business Resilience Centre (SBRC) is a not-for-profit and a respected voice in…
Do you believe in protecting organisations through cyber security? Who We Are The Scottish Business Resilience Centre (SBRC) is a not-for-profit organisation and a respected…
A zero-day (0-day) vulnerability refers to a security risk in a piece of software with no patches or mitigations to prevent cybercriminals from exploiting them….
In recent years, cryptocurrency has seen a massive rise in attention and interest and, for the majority, acts as a legitimate method of payment or…
This article was written and provided to the Scottish Business Resilience Centre by Catriona Garcia-Alis, Senior Associate, Dispute Resolution Team, CMS. I don’t remember the…
Phishing attacks are one of the most common methods threat actors use to gain access to your network and devices. If you have an email…