Brexit May Mean Shortage Of Cyber Talent – We Should Be Looking To Our Own Students

Following Theresa May’s defeat in Parliament earlier in the week, the Brexit process looks to be in a state of confusion. With that confusion comes the question of how the cybersecurity industry in the UK will keep its reputation of a world-class workforce when visas and potentially employees not wishing to stay in the UK […]
BlackRouter Ransomware Promoted As A RaaS By Iranian Developers
Ransomware called BlackRouter has been discovered being promoted as a Ransomware-as-a-Service on Telegram by an Iranian developer. This same actor previously distributed another ransomware called Blackheart and promotes other infections such as a RAT. BlackRouter was originally spotted in May 2018 and had its moment of fame when TrendMicro discovered it dropping the AnyDesk remote access program and keyloggers on victim’s […]
Implications Of No-Deal Brexit On Cross-Border Data Flow

Elizabeth Denham, Information Commissioner, has advised businesses to consider “alternative data transfer mechanisms” in the event of a no-deal Brexit, which might have implications on cross-border data flow. https://twitter.com/pyxiGDPRteam/status/1084903868163547136 Ian Smith, founder and CEO of Gospel Technology commented below, whose data security platform harnesses permissioned DLT to allow organisations to securely share critical data with third […]
Android ES File Explorer Vulnerability Exposes All User Data To Attackers On The Same Network

A serious vulnerability in a popular Android file has been discovered and exposes all the user’s data to attackers on the same network. In essence, the victim would only need to open the app once. This bug was found by researching Elliot Alderson, who posted about it on Twitter. Expert Comments below: Craig Young, Security Researcher at Tripwire: […]
Emotet Banking Trojan Resurfaces With New Spam Avoidance Capabilities

It’s been discovered that the infamous Emotet Trojan has resurfaced with a new capability – it can check IPs on infected machines to see if malicious email senders are on spam lists, allowing hackers to send malware from an email address that’s guaranteed to get through. This is further proof that organisations need to be bolstering defenses as […]
Cryptocurrency Mining Protection

Whilst the future use and viability of Cryptocurrencies may still be up for debate, the influence Bitcoin (the most famous cryptocurrency) has had on the market is clear– with its valuation peaking at just shy of $20,000 in December 2017. In fact, the global market for Blockchain (the technology that underpins bitcoin) is anticipated to […]