Latest Articles

How a spoofed email passed the SPF check and landed in my inbox

How a spoofed email passed the SPF check and landed in my inbox

How a spoofed email passed the SPF check and landed in my inbox

The Sender Policy Framework can’t help prevent spam and phishing if you allow billions of IP addresses to send as your domain

Rene Holt16 Aug 2022


Black Hat USA 2022: Burnout, a significant issue

Black Hat USA 2022: Burnout, a significant issue

Black Hat USA 2022: Burnout, a significant issue

The digital skills gap, especially in cybersecurity, is not new, but the problem is now further exacerbated by the prevalence of burnout

Tony Anscombe15 Aug 2022


Black Hat – Windows isn’t the only mass casualty platform anymore

Black Hat – Windows isn’t the only mass casualty platform anymore

Black Hat – Windows isn’t the only mass casualty platform anymore

Windows used to be the big talking point when it came to exploits resulting in mass casualties. Nowadays, talks turned to other massive attack platforms like #cloud and cars

Cameron Camp15 Aug 2022


The potential consequences of a data breach – Week in security with Tony Anscombe

The potential consequences of a data breach – Week in security with Tony Anscombe

The potential consequences of a data breach – Week in security with Tony Anscombe

The NHS falls victim to an apparent cyberattack, which raises the question of the impact that data breaches have on people's personal data

Editor12 Aug 2022


Black Hat 2022 – Cyberdefense in a global threats era

Black Hat 2022 – Cyberdefense in a global threats era

Black Hat 2022 – Cyberdefense in a global threats era

Our Security evangelist's take on this first day of Black Hat 2022, where cyberdefense was on every mind.

Tony Anscombe12 Aug 2022


Safety first: how to tweak the settings on your dating apps

Safety first: how to tweak the settings on your dating apps

Safety first: how to tweak the settings on your dating apps

Tinder, Bumble or Grindr - popular dating apps depend heavily on your location, personal data, and loose privacy settings. Find out how to put yourself out there safely by following our suggested settings tweaks.

André Lameiras12 Aug 2022


An eighties classic - Zero Trust

An eighties classic - Zero Trust

An eighties classic - Zero Trust

A deep-dive into zero trust to help you navigate the threat landscape in a zero-trust world and further secure your organization

Tony Anscombe11 Aug 2022


How to check if your PC has been hacked – and what to do next

How to check if your PC has been hacked – and what to do next

How to check if your PC has been hacked – and what to do next

Has your PC been hacked? Whatever happens, don’t panic. Read on for ten signs your PC has been hacked and handy tips on how to fix it.

Phil Muncaster09 Aug 2022


Build a zero-trust environment to protect your organization - Week in security with Tony Anscombe

Build a zero-trust environment to protect your organization - Week in security with Tony Anscombe

Build a zero-trust environment to protect your organization - Week in security with Tony Anscombe

Learn the basics of zero-trust, and how building a zero-trust environment can protect your organization.

Editor05 Aug 2022


Don't get singed by scammers while you're carrying the torch for Tinder

Don't get singed by scammers while you're carrying the torch for Tinder

Don't get singed by scammers while you're carrying the torch for Tinder

Are you on Tinder? Don't get ensnared in catfishing, sextortion, phishing and other schemes used by scammers on dating platforms.

André Lameiras04 Aug 2022


Start as you mean to go on: the top 10 steps to securing your new computer

Start as you mean to go on: the top 10 steps to securing your new computer

Start as you mean to go on: the top 10 steps to securing your new computer

Whether you are getting ready for back-to-school season, getting new work laptop or fancying a new gamer's pc, learn the steps to protect your new PC from cyberthreats.

Phil Muncaster02 Aug 2022


Music streaming platform victim of a crypto theft - Week in security with Tony Anscombe

Music streaming platform victim of a crypto theft - Week in security with Tony Anscombe

Music streaming platform victim of a crypto theft - Week in security with Tony Anscombe

Cybercriminals steal the equivalent of $18M from the NFT music streaming platform Audius, while other cyberthreats related to crypto made the news.

Editor29 Jul 2022


Apt Activity Report
MDR Protection