From the Blog

penetration testing steps
Data Protection
Peter

Peter talks to FindMyUkCasino

FindMyUkCasino.com got in touch and asked Peter some great questions. Here is little preview: Can online casinos be hacked? This is a common question among online casino players in the UK but is a question that FindMyUKCasino.com feels has never been properly answered. All slot sites licensed by the UK Gambling Commission must have certain protocols in

Read More »
penetration testing methodology
Penetration Testing
Trey Gonzales

Why Choosing the Right Penetration Testing Methodology is Crucial

The 2020 Cyber Security Breaches Survey showed that 32% of businesses and 22% of charities in the UK suffer a cyber-attack at least once a week. Penetration testing is an emerging data protection method. It requires a proper penetration testing methodology. Penetration testing identifies the possibility and impact of a cyber-attack. It does so using

Read More »
Malware
Data Protection
Peter

SB Tech Breach

Last week saw SB Tech Breached by the hacking group Maze. It seems that every week the group are announcing more victims.  GameOn asked our CEO Peter Bassill, to give us some insight into the attack. The GameOn article is here.

Read More »
Data Protection
Peter

MCA Wizard Databreach

A large volume of what is most certainly sensitive and confidential information relating to two financial companies has been found exposed online in the latest case of sysadmin or developer mistake.

Read More »
Assurance
Michael

Intel Vulnerability Enables Multiple Issues

Intel is warning users of a high severity flaw found within their firmware of it’s ‘Converged Security and Management Engine’ (CSME) which is used to power Intel’s ‘Active Management System’ hardware for the purpose of remote out-of-band management to consumers. This flaw could enable an attacker to conduct Privilege Escalation, Information Disclosure and Denial of Service.

Read More »
News
Michael

Android Bluetooth Critical RCE Flaw

A recent vulnerability was found by researchers from a German security firm. Fixes are available via the Android February 2020 Security Bulletin. The bug is identified as CVE-2020-002; when exploited can result in remote-code-execution without any user interaction with elevated privileges.

Read More »
Data Protection
Peter

Protect Your Data

With 2019 providing more breaches that records have recorded for the first six months of the year, we felt it was time to try and use a different medium to spread the word. Especially to small businesses.

Read More »
Scroll to Top