Cyber Security

UK’s Manufacturing Crisis: JLR cyberattack, supply chains and industrial fragility

When a cyberattack hit Jaguar Land Rover (JLR) - owned by India’s Tata group - at the end of August 2025, production paused across key UK sites and thousands of factory staff were told to stay home while systems were rebuilt. JLR moved to a phased restart in early October beginning with Wolverhampton, then Solihull [...]

UK’s Manufacturing Crisis: JLR cyberattack, supply chains and industrial fragility Read More »

Urgent Cyber Alert – Ransomware and Cyber Attacks escalating to war-like levels

We are issuing this urgent cyber alert in light of the dramatic surge in ransomware and cyber-attacks impacting organisations across the UK and Europe. The severity and sophistication of these attacks represent a significant escalation, moving beyond isolated incidents to what can only be described as a state of cyber warfare. Intelligence from both European

Urgent Cyber Alert – Ransomware and Cyber Attacks escalating to war-like levels Read More »

Cyber Security – who cares?

In a world where headlines constantly report rising inflation, new taxes, and perplexing government policies, it’s no wonder that massive cyber-attacks, resulting in the theft of millions of pounds and countless personal data, often go unnoticed. Many people assume these attacks are orchestrated by state actors such as China, Russia, Ukraine, North Korea, Iran and

Cyber Security – who cares? Read More »

Hybrid Warfare II – the forgotten social engineers

The over-emphasis on cyber threats in modern warfare and corporate espionage has created a false sense of security, often sidelining traditional methods like human intelligence (HUMINT). While cyber tactics, such as hacking and malware deployment, remain effective, social engineering techniques are still very much in use by both state and commercial actors to gather intelligence.

Hybrid Warfare II – the forgotten social engineers Read More »

Codename TAO – The NSA’s Mass Surveillance and Tailored Access Operations

In this era of digital connectivity, privacy is a concept that is on the one hand prized, and on the other, severely compromised. The National Security Agency (NSA), known for being one of the largest intelligence gathering agencies in the world, has continuously found itself under intense scrutiny regarding its mass surveillance operations. Its mandate

Codename TAO – The NSA’s Mass Surveillance and Tailored Access Operations Read More »

The subtle traps of sophisticated social engineering

Social engineering is on the rise. Increasingly sophisticated attacks are testing our ability to recognise scams and challenging businesses’ cybersecurity protocols. Orchestrators of such schemes exploit psychological vulnerabilities, targeting the human element of security systems rather than relying on conventional technological tactics. Their methods involve manipulating individuals so that they inadvertently reveal confidential information that

The subtle traps of sophisticated social engineering Read More »

The power of outsourced intelligence analysis

In today’s fast-paced business landscape, corporations face the formidable challenge of assessing unprecedented volumes of information. Increasingly, businesses are turning to outsourced intelligence gathering professionals to collect and make sense of vital open-source intelligence on their behalf. What are OSINT and HUMINT? While governments have a long-standing history with open-source intelligence (OSINT), the commercial world

The power of outsourced intelligence analysis Read More »

Chinese infiltration: espionage on the increase

The threat from within is being ignored. The intelligence community has been issuing warnings for companies doing business with China for some years. However, the situation in recent months has become far more serious, with the theft of intellectual property reaching unprecedented levels. The National Counter-intelligence and Security Centre (NCSC) recently warned of an update

Chinese infiltration: espionage on the increase Read More »

Corporate security: the ticking time bomb of in-house provision

In-house intelligence teams are no longer fit for purpose in safeguarding their business’ reputation and activities. Most of them lack the in-country experience and access to quality intelligence that is necessary for avoiding costly and embarrassing mistakes. Law firms, accountants and other businesses that rely solely on internal intelligence departments are playing a dangerous game

Corporate security: the ticking time bomb of in-house provision Read More »

The need for proactive investment in Cyber Security

In March 2023, Capita, a consulting digital services business, was hit by a cybersecurity breach. Compromised data from the organisation, which works with business and government, reportedly included individuals’ home addresses and passport images. Hackers were able to gain unauthorised access to Capita’s internal systems using a ransomware breach, through which less than 0.1% of

The need for proactive investment in Cyber Security Read More »

Scroll to Top