Blog

The First Ransomware Attack: A Floppy Disk’s Legacy

The First Ransomware Attack: A Floppy Disk’s Legacy

In December 1989, thousands of individuals received an unexpected package: a floppy disk labelled "AIDS Information Introductory Diskette." This seemingly benign disk would later be recognised as the vehicle for the world’s first ransomware attack, marking the dawn of...

read more
WEBINAR – API Security: Risk & Defence

WEBINAR – API Security: Risk & Defence

APIs (Application Programming Interfaces) are the digital glue holding organisations together. They enable software and systems to communicate, automate workflows, and enhance user experiences. But as their use grows, so does the risk of API security breaches....

read more
Recorded Future’s Threat Analysis Report

Recorded Future’s Threat Analysis Report

The latest cyber Threat Analysis Report from Recorded Future’s Insikt Group provides a deep dive into the most significant cyber threats of 2024 and outlines key predictions for 2025. As cybercriminals adapted to law enforcement crackdowns, businesses struggled with...

read more
When Ransomware Hits Close to Home

When Ransomware Hits Close to Home

Blacon High School in Chester, UK, recently became the latest victim of a ransomware attack... Hackers infiltrated their systems, locked critical files, and brought the school to a standstill. Students were sent home, teachers scrambled to adapt lessons to remote...

read more
Cybersecurity in New Zealand and the UK

Cybersecurity in New Zealand and the UK

Cybersecurity in New Zealand and the UK: A Shared Responsibility  It was a typical Monday morning when James*, a small-business owner in Christchurch, opened his email and froze. The subject line read: “Your system has been compromised.” The sender demanded...

read more
Why Vendor Vulnerability Data Matters in Cybersecurity

Why Vendor Vulnerability Data Matters in Cybersecurity

As cyber threats grow more sophisticated, the ability of organisations to defend themselves depends heavily on their vendors’ speed and efficiency in addressing known, published vulnerabilities. Often referred to as CVE’s.  One key aspect that often gets...

read more
Don’t miss our Cybersecurity Land Rover Experience Events

Don’t miss our Cybersecurity Land Rover Experience Events

Book Here Mark your calendars for 26 March and 15 May as we take you on the muddiest cybersecurity events in Yorkshire!  What to Expect  Our Land Rover Experience cybersecurity events provide an extraordinary setting to gain valuable insights and create...

read more
Ransomware in 2025: The Evolution of a Cyber Pandemic 

Ransomware in 2025: The Evolution of a Cyber Pandemic 

The year is 2025. Encryption, once the cornerstone of online security and privacy, has become the ultimate tool of exploitation. Cybercriminals have honed their craft, transforming ransomware from a blunt weapon into a scalpel of precision. What was once an...

read more
ITogether supports the CyberFirst Girls Competition

ITogether supports the CyberFirst Girls Competition

We’re thrilled to support the CyberFirst Girls Competition 2024/25, which kicks off today and inspires young women to explore careers in cybersecurity. Here’s why we’re backing this event:  ✅ Diversity in Tech Matters The competition empowers girls to develop...

read more
Why SQL Injection Attacks Still Succeed and How to Stop Them

Why SQL Injection Attacks Still Succeed and How to Stop Them

In today's world, we diligently lock our homes, secure our valuables, and safeguard our personal belongings. Yet, ironically, many businesses and individuals unknowingly leaving the front door open—a vulnerability so overlooked that cybercriminals continue to exploit...

read more
Why You’re Making Cybersecurity Harder Than It Needs to Be

Why You’re Making Cybersecurity Harder Than It Needs to Be

You know how it is in IT—constantly juggling multiple security systems, each with its own interface, updates, and quirks. It’s like trying to solve a puzzle where the pieces just don’t quite fit together. Lately, we’ve been hearing from fellow professionals who’ve...

read more
Don’t Miss our Cybersecurity Land Rover Experiences!

Don’t Miss our Cybersecurity Land Rover Experiences!

Our incredibly popular Cybersecurity Land Rover Experience Events are back! These are the final two for 2024 - don’t miss this exciting opportunity to join us for:   Protecting Peak: Battling Against Bots and Account Takeovers Friday 15 November, 11:00 –...

read more