Skip to main content

Cyber Security Blog

Article 15 April 2026 7 min read

Grand Theft Data: What the Rockstar Games Hack Means for Your Business

Rockstar Games was breached through a third-party cloud service, not its own systems. 78 million records leaked. Here is what UK small businesses can learn about supply chain risk.

Supply Chain Data Breach Ransomware
Read article
Article 14 April 2026 7 min read

One Million Gym Members Exposed: What the Basic-Fit Data Breach Means for Your Small Business

Europe's largest gym chain lost bank details, names and dates of birth of 1 million members. Learn what UK small businesses can take from this breach.

Data Breach Small Business Security GDPR
Read article
Article 13 April 2026 7 min read

The Booking.com Breach: What Small Businesses Need to Know Right Now

Booking.com has confirmed a data breach exposing customer names, emails, addresses and booking details. Here is what UK small businesses must do to protect themselves and their customers.

Data Breach Travel Industry Phishing
Read article
Article 12 April 2026 7 min read

Adobe Acrobat Under Attack: What Every Small Business Needs to Do Right Now

Adobe Acrobat Reader has a critical security flaw being actively exploited. Learn what UK small businesses must do immediately to protect their data and operations.

Cyber Security Adobe Vulnerability
Read article
Article 11 April 2026 7 min read

Tech Bosses Face Jail Over Intimate Image Abuse

UK government threatens tech executives with prison for failing to remove non-consensual intimate images. What small businesses need to know about compliance.

Online Safety UK Regulation Compliance
Read article
Article 10 April 2026 6 min read

Fleet Management Software Knocked Offline by Cyber Attack — What Small Businesses Need to Know

Chevin's FleetWave fleet management platform taken offline after a cyber security incident. What UK small businesses using SaaS tools must learn from this.

Cyber Security SaaS Risk Supply Chain
Read article
Podcast 10 April 2026 18 min listen

Inside the Kill Chain: How One Phish Led to Full Network Compromise — Ep.2

Episode 2 of Inside the Box: a real pen test mapped to the Kill Chain, Fortinet zero-days, LiteLLM supply chain attack, APT28 router hijacking and more.

Podcast Inside the Box Kill Chain
Listen now
Article 10 April 2026 7 min read

Energy Company Loses £700,000 in a Single Payment Fraud — How to Stop It Happening to Your Business

UK-listed Zephyr Energy lost £700K when attackers redirected a contractor payment. Learn how payment diversion fraud works and how to protect your business.

Cyber Security Payment Fraud Business Email Compromise
Read article
Article 9 April 2026 7 min read

BrowserGate: What Data Is Leaking from Your Team's Browsers Right Now?

LinkedIn secretly scans 6,000+ browser extensions. Learn what BrowserGate means for UK small businesses, what data your team is leaking, and how to fix it.

Browser Security Data Privacy BrowserGate
Read article
Article 9 April 2026 9 min read

Your Factory Floor PLC Might Be Internet-Exposed — And You Don't Even Know It

Iran-linked hackers are targeting internet-exposed PLCs in factories and utilities. Learn why your operational technology might be at risk and how to protect it.

OT Security Industrial Control Systems Cyber Essentials
Read article
Article 8 April 2026 7 min read

NHS Scotland Domains Hijacked to Serve Dodgy Content — What Small Businesses Can Learn

NHS Scotland GP practice websites were hijacked to serve illicit content. Learn what UK small businesses must do to protect their own websites from similar attacks.

Website Security Small Business Domain Hijacking
Read article
Article 7 April 2026 8 min read

Russian Hackers Are Targeting Home Routers to Steal Passwords — Is Yours at Risk?

The UK NCSC warns that Russian state hackers are exploiting home and small office routers to steal passwords. Learn how to check and protect your business router.

Router Security Small Business DNS Hijacking
Read article