Cybercrime

‘Silent Partners’ Part 2 – organised crime’s black market activities

A troubling and complex issue has emerged in response to the US-led sanctions on Russia following its invasion of Ukraine. Organised crime groups (OCGs), driven by their relentless pursuit of profit, have found fertile ground in evading these sanctions, resulting in a cascade of effects felt across the globe. This is Part 2 of an [...]

‘Silent Partners’ Part 2 – organised crime’s black market activities Read More »

The power of outsourced intelligence analysis

In today’s fast-paced business landscape, corporations face the formidable challenge of assessing unprecedented volumes of information. Increasingly, businesses are turning to outsourced intelligence gathering professionals to collect and make sense of vital open-source intelligence on their behalf. What are OSINT and HUMINT? While governments have a long-standing history with open-source intelligence (OSINT), the commercial world

The power of outsourced intelligence analysis Read More »

The need for proactive investment in Cyber Security

In March 2023, Capita, a consulting digital services business, was hit by a cybersecurity breach. Compromised data from the organisation, which works with business and government, reportedly included individuals’ home addresses and passport images. Hackers were able to gain unauthorised access to Capita’s internal systems using a ransomware breach, through which less than 0.1% of

The need for proactive investment in Cyber Security Read More »

Georgia: The song remains the same

As the fifteen-year anniversary of Vladimir Putin’s first attempt at recreating the Soviet Union approaches, the 2008 invasion of Georgia and the brief conflict that resulted needs to be reassessed: both as a military offensive on its own terms, and as part of a Kremlin grand strategy that has only intensified in the years since.

Georgia: The song remains the same Read More »

Cyber Security in the Workplace

IT vs Cybersecurity: Not where the battle lies Information technology (IT) is concerned with the storage and transmission of digital information. Cyber-security is the protection of the same: both the information, and the means by which it is stored or transmitted. It is crucial that the two are never seen as ‘at odds’ with each

Cyber Security in the Workplace Read More »

Mustang Panda, Hidden Dragon

‘Bronze President’ is not just another nickname for Donald Trump. It is a Chinese state-sponsored hacking group that has historically operated in the South Asian region, working across Hong Kong, Vietnam, and Burma (Myanmar), to gather sensitive information of interest to Beijing in its own backyard. But there are signs that the group’s targets are

Mustang Panda, Hidden Dragon Read More »

Business Risk Update

Welcome to the latest edition of ‘Business Risk Update’ – specifically for our clients and partners to provide a snapshot of latest news and articles from the business. The war in Ukraine has been raging for over two months and, despite heroic Ukrainian resistance, there is no end in sight. The grimmest predictions for the

Business Risk Update Read More »

International tension and the changing face of cybercrime: predictions for 2022

The past two pandemic-afflicted years have seen coronavirus  dominate the news agenda, and what would in typical times be headline news, relegated off the front page. As the world prepares to enter the third year of uncertainty, now more than ever must the key events be treated with appropriate gravity; as they will contribute towards

International tension and the changing face of cybercrime: predictions for 2022 Read More »

Scroll to Top