• 07 3184 7575
  • September 30, 2024
  • 0 Comments

SaaS Deployments: Why Security Must Be a Priority for CISOs

Is your organization truly secure when it comes to Software-as-a-Service (SaaS) deployments? Many Chief Information Security Officers (CISOs) face a troubling reality: they hold accountability for security breaches without having direct control over SaaS implementations. This disconnect between responsibility and control can lead to serious security vulnerabilities. SaaS platforms are popular because they are easy […]

  • September 23, 2024
  • 0 Comments

Ransomware Payments and Cryptocurrency Theft Surge in 2024

Are you keeping up with the latest trends in cybercrime? The first half of 2024 has seen alarming increases in ransomware payments and cryptocurrency theft, according to blockchain analysis firm Chainalysis. While some types of illegal on-chain activity have dropped, these specific cyber threats are on the rise. Chainalysis reports that ransomware payments have climbed […]

  • September 19, 2024
  • 0 Comments

Is Your State a Cybercrime Hotspot?

A critical zero-click remote code execution (RCE) vulnerability, identified as CVE-2024-30103, was recently discovered in Microsoft Outlook. This flaw allows malicious actors to execute arbitrary code on a victim’s system simply by opening a specially crafted email. Review the details of this Cybersecurity Threat Advisory to limit your potential impact. What is the threat? CVE-2024-30103 […]

  • September 16, 2024
  • 0 Comments

Millions of WordPress Sites at Risk Due to Critical Plugin Vulnerability

Are you running a WordPress site with the Litespeed Cache plugin? You could be vulnerable to a serious security risk. Millions of websites may be at risk of takeover due to a critical vulnerability found in this popular plugin. Litespeed Cache is a widely-used plugin designed to improve website performance by caching content. With over […]

  • September 12, 2024
  • 0 Comments

Critical SAP vulnerabilities

SAP issued its August 2024 security patch update which included two critical flaws that enable attackers to bypass authentication and fully compromise affected systems. Review the details in this Cybersecurity Threat Advisory to learn how you can protect your SAP environment. What is the threat? SAP’s August security update addressed 17 vulnerabilities. Of the 17 […]

  • September 11, 2024
  • 0 Comments

Stay compliant with the Barristers Rules – A complimentary webinar

Dear All, Are you confident in your compliance with the Barristers Rules, especially with growing cybersecurity threats on the horizon? We invite you to an exclusive CPD webinar presented by Cyber Safe Business, where Barrister Richard Douglas KC from Callinan Chambers and Hemmant’s List, and Alex Halim, CISO at Cyber Safe Business, will delve into […]

  • September 11, 2024
  • 0 Comments

Thank You to All Who Joined Our August 2024 Webinar!

A huge thank you to everyone who attended and actively participated in our recent webinar, “Cyber Safe Business Practices for Barristers,” held in August 2024. It was a great success thanks to your engagement and enthusiasm! For those who couldn’t make it, don’t worry—we’ve got more valuable insights coming your way. Mark your calendars for […]

  • September 9, 2024
  • 0 Comments

Google Warns of Active Exploitation of Chrome Vulnerability

Did you know your browser could be a gateway for cyberattacks? Google recently issued a warning about a significant vulnerability in Chrome that’s being actively exploited in the wild. This comes just days after the release of Chrome version 128, which addressed a previous zero-day vulnerability. The newly identified issue, tracked as CVE-2024-7965, has a […]

  • September 2, 2024
  • 0 Comments

Anti-malware vendor ESET is warning of a new phishing tactic targeting iOS and Android users

Anti-malware vendor ESET is warning of a new phishing tactic targeting iOS and Android users with web applications mimicking legitimate banking software to bypass security protections and steal login credentials. On both iOS and Android platforms, ESET warns that cybercriminals used Progressive Web Applications (PWA), which are websites bundled to look like stand-alone applications, while […]

  • August 29, 2024
  • 0 Comments

Major Backdoor in Millions of RFID Cards Allows Instant Cloning

Have you ever considered how secure your office or hotel key cards really are? Recent research by French security firm Quarkslab has uncovered a serious vulnerability that could impact millions of contactless cards worldwide. These cards, produced by Shanghai Fudan Microelectronics Group, contain a backdoor that allows hackers to clone them in mere minutes.  This […]