Secrutiny Cyber Security Blog

Get the latest in security advisories, threat commentary and remediation recommendations from information security experts.


SUBSCRIBE TO OUR NEWSLETTER

Domain Impersonation: The Popular New Tactic for Phishing Attacks

Domain Impersonation: The Popular New Tactic for Phishing Attacks

Domain impersonation is increasingly becoming a problem which targets businesses and their customers. Phishing attackers are now advancing their level of sophistication by utilising domain impersonation as part of BEC scams that can result in CEO fraud, malware infection, or ransom.

COVID-19 Related Cyber Attacks Survival Guide

COVID-19 Related Cyber Attacks Survival Guide

With much of the UK working from home due to COVID-19, malicious actors are taking advantage of the pandemic to find opportunities for distributing their malware to unsuspecting users. This blog will give a high-level overview of campaigns and IOCs discovered by Anomali.

Getting Security Smart With MITRE ATT&CK Framework

Getting Security Smart With MITRE ATT&CK Framework

Secrutiny is all about helping organisations effectively determine their risk appetite and define cyber risk remediation priority based-on evidence. Through research and exploration, Secrutiny has identified the MITRE ATT&CK Framework as a tool to help cyber security professionals mature, secure and assure their organisations.

Get in touch