Skip to content
arrow-alt-circle-up icon

Cyber Incident?

arrow-alt-circle-up icon

Call 00800 1744 0000

arrow-alt-circle-up icon

Adversary-Simulation-1
Informing You About What Matters

Read Our latest Intel and Research

On this page you can find the latest threat intel and research from our confident cyber security crew.

Forensics-News

How To Adapt Dissect Acquire For Hypervisor-Based Scalable Evidence Collection During Ransomware Attacks

Read More

Handelsblatt-Webinar

BlackoutReloaded: Exploiting Antifraud Software Of Banks To Kill Microsoft Defender

Read More

cyber-risk-europe

VIVE VR Headset Kernel Driver Vulnerable For Out Of Bounds Memory Read

Read More

Landing-Extra-2

RansomHouse Am See

Read More

CERT_Helicopter_5-copy

Ivanti/Pulse VPN Privilege Escalation Exploit 

Read More

Intel-Landing

Analysis Of New Active Malware: MediaArena – PUA

Read More

NIS2-Landing

Black Basta - An Analysis Of Their Methods And Malware

Read More

Landing-Extra-3

Decrypting PasswordState Entries

Read More

Landing-Extra-2

How To Use And Defend Against MFA Fatigue Attacks

Read more

NIS2-Next-Landing

Inside The World Of Ransomware(1/3): Dissecting The Attack 

Read More

Landing-Extra-2

Inside The World Of Ransomware (2/3): Different Roles Within A Ransomware Attack

Read more

Intel-Landing

Inside The World Of Ransomware 3/3: CONTI, RYUK And HIVE Affiliates, The Hidden Link

Read More

Landing-Extra

QBOT Spam Campaign

Read More

Landing-Extra-3

LockBit 3.0 - An In-Depth Analysis Of LockBit Black's Config

Read More

Toolset-Landing-Page

SOC – Testing Microsoft Sentinel Analytic Rules At Scale

Read more

NIS2-Next-Landing

When The Hackers Get Hacked

Read More

cyber-risk-europe

Abusing Empty Passwords During Your Next Red Teaming Engagement

Read More

Toolset-Landing-Page

When The Hackers Get Hacked: part 2

Read More