Latest News
The Harrods Breach: Why Silence is the Wrong Strategy
The Harrods Breach. Why Silence is the Wrong Strategy The news that luxury department store Harrods has suffered a significant IT breach, resulting in the theft of data relating to 430,000 customer records, is a sober reminder that no business, regardless of size or reputation, is immune to cyber threats.
Read more
15% of any ransom payment if you give us access to your PC
The human firewall? Having spent decades on the front lines of law enforcement and now navigating the complex, high-stakes negotiations following major organisational breaches, I have witnessed firsthand how rapidly cybercrime tactics evolve.
Read more
How to Safeguard Your Business from Unauthorised Physical Intrusions: A Comprehensive Guide
Introduction In today’s interconnected world, businesses face a constant threat of unauthorised intrusions. Whether it’s a physical break-in or a cyberattack, these incidents can have devastating consequences for your organisation.
Read more
The Ransomware Negotiation Dilemma: The Pros And Cons Of Negotiation Strategies BSides Exeter UK 2024
BSides Exeter has finally released the youtube video of the talk “The Ransomware Negotiation Dilemma: The Pros And Cons Of Negotiation Strategies”
Read more
Could your Cleaners be a Vulnerability in your Physical Security
The Overlooked Weak Link: Could your Cleaners be a Vulnerability in your Physical Security If you’ve ever worked in a large corporate office, you’re likely familiar with the different groups that keep the place running—employees, engineers, managers, and even external contractors.
Read more
Sharing After the Storm: Fostering Transparency in Post-Ransomware Response
Sharing After the Storm: Fostering Transparency in Post-Ransomware Response Ransomware attacks are a harsh reality of the digital age.
Read more
BSides Exeter, South West UK 2024: Let's talk about Ransomware Negotiation
Gear Up for BSides Exeter: Unveiling the Secrets of Ransomware Negotiation Calling all cybersecurity professionals and enthusiasts in the southwest of England!
Read more
Securing Your Strategy: Preparing for Ransomware Attacks and Payment Dilemmas
Would you be prepared to make a Ransomware Payment? Another year has passed, more Ransomware gangs have been taken offline by law enforcement, yet the anticipated decline in ransomware and double extortion attacks remains elusive.
Read more
LockBit Ransomware Operations Seized in ‘Operation Cronos’: What You Need to Know
A lot has happened in the last few days since the 19th February 2024, in the dark world of Ransomware gang activity.
Read more
Unmasking Ransomware: Origins, Types, and Notorious Attacks
Introduction: Ransomware, a malicious software that encrypts a victim’s files or entire computer system and demands payment for their release, has become a pervasive and formidable threat in the digital age.
Read more
Ransomware Negotiation Tactics Evolve as Victims Seek Discounts and Threat Actors Try to Avoid Being Scammed.
The landscape of ransomware negotiation is undergoing significant evolution, as illustrated by a recent reported news story involving a European manufacturing company.
Read more