UK ‘On Alert For China Cyber Attack’ – Comment

As tensions grow between London and Beijing, the UK government must remain alert to potential cyber attacks from China over the next few months. In light of this, please find below comments from the expert.

The Rise Of Remote Work: How To Use Technology To Engage, Connect And Protect Your Employees

The coronavirus pandemic has seen an exponential rise in the amount of people switching to remote work. Since mid-February, 88%[1] of global organisations have encouraged or required their employees to work from home. Before COVID-19, 1.7 million people in the UK[2] worked from home, but due to lockdown restrictions, which has caused a seismic shift in working […]

Cyber Experts Comment On US Secret Service Creates New Cyber Fraud Task Force

The U.S. Secret Service has announced the creation of the Cyber Fraud Task Force (CFTF) “designed to improve the coordination, sharing of expertise and resources, and dissemination of best practices for all its core investigations of financially-motivated cybercrime. The CFTFs will leverage the combined resources and expertise of both the ECTFs and FCTFs to collaboratively investigative the […]

Expert Advise on Zoom Zero Day Vulnerability Allows Hackers to Target Windows 7 PCs


A previously unknown flaw in the videoconferencing software Zoom could allow a hacker to remotely commandeer computers running old versions of the Microsoft Windows operating system, security researchers said Thursday. A hacker who successfully exploits the vulnerability could access files on the vulnerable computer, said Mitja Kolsek, chief executive of ACROS Security, the Slovenian cybersecurity […]

Security Expert Re: New WordPress RCE Exploit (CVSS Score 10.0 )

Webmasters who use WordPress plugin Adning Advertising are urged to patch against a critical vulnerability that is reportedly being exploited in the wild. Exploitation of the flaw enables an unauthenticated attacker to upload arbitrary files, leading to remote code execution (RCE) and potentially a full site takeover. Such is the flaw’s seriousness, MITRE has assigned […]