Posts in Information Security

A close up of a cell phone on a table

Anthropic Mythos explained

Anthropic Mythos explained What it is, why it matters, and what matters now Mythos (aka Claude Mythos Preview) is a frontier AI model developed by[…]

pie graph illustration

Cyber Breaches Survey 2025 – Free Infographic!

The UK Government annually conducts and releases a Cyber Security Breaches Survey. This survey provides a glimpse into the current state of cyber security in[…]

LastPass : Is it time to leave?

2022 was not LastPass’s year. For those unaware, the Password Mis-manager has been the target of a number of security incidents. The last in November[…]

close up photo of a gold pocket watch

2022: a year in cyber incidents

What a year 2022 has been!  From the fallout of the COVID pandemic still lingering (including Partygate), Storm Eunice, Russia invading Ukraine, the Queens Platinum[…]

Give your cybersecurity some love

Its valentines day and whether you love or hate it, there’s always a few broken hearts. But don’t let your cybersecurity be one of them.[…]

How to protect your business from a Twitter-style hack

Background Social Media platform giant Twitter reported a security incident on Wednesday 15th July 20 which affected scores of verified accounts including Bill Gates, Elon[…]

COVID-19 – stay secure and stay safe.

The COVID-19 pandemic has caused a seismic shift towards digital interaction throughout our lives. Remote working became mainstream overnight across thousands of businesses, with virtual[…]

Psst..do you want some ‘free’ software?

Chances are you’re getting more than you bargained for. The security research team at Cybereason has recently highlighted the threats from attempting to download ‘cracked’[…]

Covering your hidden threats

Happy New Year! And to a new decade. Many of us are already in the midst of working on our new years’ goals, from eating[…]

A large fish pulling fishing a man out of water

Did you get caught Phishing this summer?

Business Email Compromise (BEC) attacks have become one of the most successful and damaging forms of Phishing, as attackers switch tactics to avoid detection and[…]