What is Two-Factor Authentication, and Why Should I Use It?
Logging in has been a critical part of owning an account since the birth of the internet. Most people do it multiple times daily, many…
Logging in has been a critical part of owning an account since the birth of the internet. Most people do it multiple times daily, many…
It is a common misconception that cyber security is an area for IT managers and network admins to focus on. Many organisations that outsource their…
Jeremy Aylott, Lead Ethical Hacker at the Scottish Business Resilience Centre explains why simulated phishing exercises are beneficial as part of an organisation’s cyber security…
Affected Systems: FortiOS versions 7.2.1, 7.2.0, 7.0.6, 7.0.5, 7.0.4, 7.0.3, 7.0.2, 7.0.1, and 7.0.0 FortiProxy versions 7.2.0, 7.0.6, 7.0.5, 7.0.4, 7.0.3, 7.0.2, 7.0.1, and 7.0.0…
Intelligence received at the Scottish Business Resilience Centre is warning of a current and active banking trojan campaign seen in the UK and around the…
If you’ve ever had an account on a website affected by a data breach, then chances are your credentials may be used in credential-stuffing attacks….
Affected Systems: Microsoft Exchange Server 2013, Exchange Server 2016, and Exchange Server 2019 Description: Researchers at cybersecurity firm GTSC have discovered two new zero-day vulnerabilities affecting Microsoft Exchange Server 2013, 2016,…
A new IT security training workshop launched today will give organisations the tools to protect themselves against the reputational risk associated with data leaks. The…
Description: Ukraine’s Ministry of Defence has warned of Russian plans to conduct mass cyber attacks on critical infrastructure belonging to Ukraine and its allies. The article details…