James Serjeant
IT Manager - Cresta World Travel Ltd
Our core service providing a 24/7/365 cyber managed service to identify, detect and respond to security events and incidents across your IT infrastructure.
World-class protection delivered in real-time against all endpoint and server ransomware and malware.
Advanced cyber monitoring and protection for your mobiles and tablets, ensuring all your devices remain safe and secure.
Providing experienced, knowledgeable cyber professionals and technical experts to deliver specialist advice, both remotely and on-site.
Clear and concise cyber assessments benchmarked against UK and International frameworks, to provide a clear understanding of your cyber risks, gaps and recommendations for improvement.
Delivering your UK Government Cyber Essentials Certification through our expert Cyber Consultants and Assessors.
Formally test and identify gaps in your IT infrastructure with our qualified team of Penetration Testers.
Our real-time service will identify and recommend areas of your infrastructure, that requires updates and fixes, to stay ahead of the cyber threat.
Bespoke training delivered through our eLearning platform, or face-to-face through our Cyber professionals and experts.
The Digital Operational Resilience Act is a European framework that establishes a uniform approach regarding the security integrity of the information and communication technology (ICT) systems processed by participants in the financial markets within the European Union’s jurisdiction.........
With remote desktop protocol (RDP) compromises on the rise, Microsoft Defender for Endpoint has introduced a new field that can provide analysts with full visibility into potentially malicious RDP session use.........
We commit to uphold the Armed Forces Covenant and support the Armed Forces Community. We recognise the contribution that Service personnel, both regular and reservist, veterans and military families make to our organisation, our community and to the country.........
Once more, we are in the midst of a cyber ransomware attack. Today's target is Synnovis, an NHS blood testing provider that collaborates with several NHS Foundation Trusts, including Guy's and St. Thomas' and King's College Hospital NHS Foundation Trust.........
GoldFactory has created a highly advanced Trojan application that is designed to exfiltrate facial recognition data from a victims phone to an attacker operated database. This data is then used within an artificial intelligence workflow to create ‘deepfakes’ of victims and gain access to their facial recognition secured banking applications.........
This report documents the threat group Volt Typhoon and their TTPs (Tactics, Techniques and Procedures). Containing recommendations to help detect and mitigate the threat. The report also includes references where information within this report was identified from.........
FluidOne, the market-leading provider of Connected Cloud Solutions, announced today that its cyber division Cyber Security Associates (CSA) has acquired SureCloud Cyber Services, a UK-based company with expertise in CREST and NCSC CHECK certified penetration testing and specialist cyber risk consulting.......
In a startling turn of events, the British Library, one of the world's most renowned repositories of knowledge, has fallen victim to a cyber-attack that has sent shockwaves throughout the business community........
In our interconnected global landscape dominated by digital engagements, cyber threats have undergone a transformative evolution, leveraging vulnerabilities in unprecedented ways.......
A C2 Framework (Command and Control) is a set of tools and protocols which allow red teamers or hackers to have remote control over compromised devices through network connections. This has recently become an issue as there have been recent cyber-attacks that rely on these Frameworks. This article will discuss MuddyWater’s version of the C2 Framework, which is an Iranian government-sponsored advanced persistent threat (APT).......
In the ever-evolving landscape of cybersecurity threats, a new ongoing campaign has emerged, known as the Elektra-Leak. This campaign focuses on Amazon Web Services (AWS) Identity and Access Management (IAM) Credentials within public GitHub repos, aiming to exploit these vulnerabilities for cryptojacking activities.......
As Ransomware groups continue to grow, they become increasingly sophisticated and organised, developing help centres for victims to claim their data end even creating job postings on the dark web. It does seem these groups intend to stay rooted within the cyber landscape by integrating business-like strategies........
QR codes, also known as Quick Response codes, have become increasingly popular in recent years. They are a convenient and versatile way to access information, such as menus, product information, and website content. However, QR codes can also be used for malicious purposes, such as phishing.......
Information security is a very broad field. It spans across misuse of enterprise information, disruption, unauthorised access, and covers both physical aspects of security as well as cyber security. Technologies used include endpoint protection and response (EDR), vulnerability management tools, and security information and event management (SIEM) tools.......
When we park or store our cars overnight, we often give thought to the valuable items, careful not to leave them in view or not in the car at all. But what if there was valuable extractable information stored within the car itself, giving rise to a potential attack surface vector that could fall into the hands of an opportune, patient or malicious actor.......
With the increased commonplace of 5G technology around the country, interesting and unique challenges have come forward. The main difference to its predecessors is its much larger density of transmission towers due to its much higher frequency transmission range. This coupled with interesting network slicing abilities makes this one of the largest steps forward the technology has everseen........
Imagine that after a hard day’s work, you suddenly receive a multitude of multifactor authentication (MFA) prompts requesting that you accept. You must be thinking to yourself how annoying these notifications are. After declining a bulk of them, you suddenly tapped the “Approve” button to relieve all that stress of thinking it was probably maintenance work or an update. Have you realized what sort of consequences it will bring to yourself and the organization you are working for?.......
Just over 18 months ago, Cyber Security Associates Limited (CSA) took the decision to use the Microsoft Security stack tooling as the primary capability to provide 24/7 Monitoring, Detection and Response (MDR) services. Using Microsoft Sentinel as the main vehicle to correlate, analyse and identify potential and actual cyber security threats and incidents has enabled the CSA Security Operations Centre to accelerate its growth and capabilities......
Threat actors linked to the BlackCat ransomware have been seen using malvertising strategies to propagate malicious WinSCP installs. Threat actors are now creating fake domains to imitate legitimate businesses to further spread malicious software through a technique called malvertising......
Our reliance on mobile phones has soared to unprecedented heights. We entrust them with everything; from banking to booking holidays, because of this the amount of personal data they hold can be frightening. In this blog post the profound effects of an attack on our devices is explored. Fortunately, the rise of full device encryption offers a glimmer of hope.....
You may have heard the saying “A chain is only as strong as its weakest link”. Recent cyber security attacks have shown why this quote is relevant to all organisations that handle data. This article will highlight why third-party risk management is essential for your organisation’s cyber security.....
Cyber Security Associates has partnered with SentinelOne to provide clients with a fully managed service built upon the Singularity XDR platform. The SentinelOne Singularity security platform empowers SOC & IT Operations Teams with a more efficient way to protect information assets against today’s sophisticated threats......
Capita is a British multinational company that specializes in business process outsourcing and professional services. It is the largest such company in the UK, with a market share of over 29%. Capita has a wide range of clients, including central government, local government, and the private sector. It also has a property and infrastructure consultancy division.....
The modern day era is constantly changing and we are increasingly integrating technology into our everyday lives to make daily tasks more easier and time efficient. Gone are the days of manually typing website addresses into browsers, thanks to QR Codes a contactless solution....
2024 Cyber Security Associates Ltd - All Rights Reserved | All Logos and Trademarks are © or ™ of there respective owners