• Monthly Crypto Report – August 2022

    August was an action-packed month in the cryptocurrency space, filled with a wide range of hacks and scams. One of the most prominent attacks seen this month was Ice Phishing, with one incident resulting in around half a million dollars’ worth of assets lost to the scam. The growth of the cryptocurrency space is showing…

  • Kazakhstan: moving on?

    There are interesting things happening in Kazakhstan, just as an important summit being attended by President Vladimir Putin and China’s President Xi Jinping, along with the leaders of India and Iran, takes place in Central Asia this week. According to several unconfirmed reports, Kazakhstan is planning to withdraw from its membership of the Collective Security…

  • R&D Security Report

    Research and Development (R&D) is a vital part of business for many companies and a significant proportion of the GDP of leading global economies. Advanced R&D provides an attractive target for a wide range of attackers seeking to steal the “crown jewels” of intellectual property. R&D activities often involve trying out new technologies. Supply chain…

  • Poland: The Increasing Threat of Cyber Attacks

    In common with internet users around the world, both organisations and private individuals in Poland face an increasing risk of cyber attacks. A 2022 survey called Cyber Security Barometer, carried out by the global consultancy KPMG, found that since 2021, 29% of Poland’s businesses have been hit by at least one cyber attack. While this…

  • The Big Myth of Ransomware

    The whole point of ransomware is to make money for malicious actors who manage to identify security weakness in your organisation. Like any “service” it is going to come at a cost; and a ransomware incident is likely to be both very embarrassing and, when combined with data extortion, potentially very expensive. It is time…

  • The Evolution of ISO 27001

    In October 2005, the first version of the ISO 27001 was published and essentially replaced BS7799-2 as an audit standard for identifying the maturity and effectiveness of Information Management Systems. Over the years, the standard has matured and developed largely because of the growth in system complexity, the introduction of new technologies and the evolution…

  • Who is Trickbot?

    Since the start of the Russia-Ukraine conflict, Russian based cybercrime groups have been placed into a difficult position. With many groups being comprised of a variety of different nationalities, the various members need to make decisions on allegiance. Leading the charge was the Conti ransomware group who decided on 25 February 2022 to make a…

  • Ten Ways to Lose Your Crypto

    Cryptocurrency exchanges are the infrastructure used to transfer and exchange – as the name suggests – cryptocurrency. From as early as 2010 with the founding of Mt. Gox, crypto exchanges have been targets for cyber criminals and malicious nation state actors due to the lucrative prizes open to them from gaining unauthorised access. On close…

  • The Kremlin’s three failures in Ukraine

    May 9 ‘Djen Pobedy’ (День Победы) is a day of huge celebration in Russia. Events take place in towns throughout the country to mark the victory of the Soviet Union over Nazi Germany in World War 2. Before the invasion of Ukraine on 24 February, Vladimir Putin doubtless had visions of new displays of adulation…

  • Will Food Become Russia’s Next Weapon?

    Suddenly countries that we never spend much time thinking about are on the front lines of an epic struggle between an anachronistic, totalitarian regime – which also happens to be running the world’s largest country by land mass – and a western European economy built on a consumer growth influenced by various levels of socialism.…

  • Lessons Learned from Supply Chain Hardening Project

    International supply chain hardening projects can be an immense undertaking for an organisation. Through experience, observation and participation, there are key factors for success as well as the need for flexibility and appropriate resourcing for the exercise. Cyjax has recently published a white paper detailing an example of an international supply chain hardening project which…

  • Ransomware Review – February 2022

    Our rundown of the key ransomware events, attacks, and group activity from February. The FBI has issued an advisory warning that the BlackByte ransomware group has been observed targeting multiple US-based entities, including at least three related to critical infrastructure. Government facilities, alongside organisations in the financial, food and agriculture sectors, are all defined as…

Scroll to Top