top of page



Evide hack shows how we must take third-party security management more seriously
This week, another hack effecting vulnerable end users in Ireland and the UK will have caused a great deal of stress and anxiety for the...

Stephen Parsons
Apr 18, 20234 min read


The trouble with Excel based Cyber Risk Management
The drawbacks of using Excel to manage your cyber risk register. Many organisations use Excel to manage their cyber risk register. ...

Stephen Parsons
Jan 13, 20232 min read


How to create secure passwords
A secure password is typically one that is long, random, and complex. Here are some tips for creating a secure password: Use a mix of...

Stephen Parsons
Dec 12, 20221 min read


Critical Zero-day vulnerability in Apache Log4j Java library
Description Security researchers has discovered a new zero-day vulnerability dubbed Log4Shell in Apache Log4j Java-based logging library...

Rachel Hanlon
Dec 13, 20211 min read


1.2 million Customer Accounts affected by GoDaddy Breach
Description Security Researchers have discovered that the Web hosting company GoDaddy has been hacked and 1.2 million customer accounts...

Megan Haybyrne
Nov 23, 20211 min read


Iranian APT Observed Targeting Fortinet and Microsoft Exchange Vulnerabilities
Description FBI and CISA observed Iranian APT targeting Fortinet and Microsoft exchange vulnerabilities to gain access to vulnerable...

Rachel Hanlon
Nov 19, 20211 min read


A Harvester Group targeting Telcos, government&IT sector has been discovered by security researchers
Description Harvester group is targeting telecommunications, government, and information technology sectors by using custom backdoor to...

Rachel Hanlon
Oct 19, 20211 min read


Cost of Ransomware Breach
Ransomware is a form of malware or virus that encrypts a victim’s files. The attacker then demands a ransom from the victim to restore...

Rachel Hanlon
Oct 6, 20212 min read


A patch has been released by VMware for the critical vulnerability in vCenter Server
Description VMware released a patch for multiple vulnerabilities in VMware vCenter Server and VMware Cloud Foundation including arbitrary...

Rachel Hanlon
Sep 22, 20211 min read


Ransomware Attacks
What is Ransomware It’s is a form of malware or virus that encrypts a victim's files. The attacker then demands a ransom from the victim...

Rachel Hanlon
Sep 21, 20211 min read


How do Cyber Attacks Work?
Cyberattacks can differ in many ways such as type of attack, size and results. However, there is a basic structure that cyber criminals...

Megan Haybyrne
Sep 14, 20211 min read
bottom of page