Cyber Security

Mustang Panda, Hidden Dragon

‘Bronze President’ is not just another nickname for Donald Trump. It is a Chinese state-sponsored hacking group that has historically operated in the South Asian region, working across Hong Kong, Vietnam, and Burma (Myanmar), to gather sensitive information of interest to Beijing in its own backyard. But there are signs that the group’s targets are …

Mustang Panda, Hidden Dragon Read More »

Business Risk Update

Welcome to the latest edition of ‘Business Risk Update’ – specifically for our clients and partners to provide a snapshot of latest news and articles from the business.The war in Ukraine has been raging for over two months and, despite heroic Ukrainian resistance, there is no end in sight. The grimmest predictions for the future …

Business Risk Update Read More »

Public enemies 123 article

Public Enemies No. 1, 2, 3…

Is the threat picture irrevocably changing? That’s the question posed by Director of MI5, Ken McCallum, in his second yearly annual threat update recently. Tellingly, ‘disruptive threats’ from states – defined by McCallum as ‘less visible’ when compared to the typical terrorist atrocities – are now put on a par with the latter – and …

Public Enemies No. 1, 2, 3… Read More »

Hacked off: the rise of ransoms for ransomware

Norwegian conglomerate Norsk Hydro has spent £45 million GBP attempting to return to ‘business as normal’ following a devastating cyber-attack that has taken out over 20,000 devices in 170 countries worldwide. Far from being an isolated incident, this extreme application of bad-actor cyber techniques to cripple some of the biggest companies in the planet is …

Hacked off: the rise of ransoms for ransomware Read More »

Honeypots

Russia: a difficult bear to lure

The laziness of hackers is making them smarter. Technological advance is offering new techniques to malign actors and honeypots provide the opportunity to observe how hackers operate. In new types of attack the “dirty work” is carried out by the machine drastically cutting human involvement and time. What it is worrying is not only that …

Russia: a difficult bear to lure Read More »

Cybersecurity with Donald Rumsfeld: where are your unknown unknowns?

News comes that in recent days, the UK launched a large-scale cyber-attack on Islamic State designed to “hinder and suppress” the group’s ability to co-ordinate and spread their words. While one might find it strange for a sovereign government to openly admit to this kind of provocation, the specific dynamics surrounding IS at least make …

Cybersecurity with Donald Rumsfeld: where are your unknown unknowns? Read More »

The cyber threat: a matter of compliance

2018 is the year of cyber. In spring two important pieces of EU legislation will come into force: the Network Information System (NIS) Directive and the General Data Protection Regulation (GDPR). Failure to comply with the requirements will impose heavy fines on businesses. Therefore, the government is stepping up against the cyber threat in legal …

The cyber threat: a matter of compliance Read More »

Scroll to Top