Sitemap
- Home
- Security Survey
- Q2 2024 Secarma Threat Report
- Cybersecurity Survey
- Q2 State of the Nation Whitepaper
- Whitepapers
- Secarma, making the world a safer place.
- Blog
- Test
- Privacy Policy
- ACT Framework
- Contact
- Terms and Conditions
- Accreditations
- Careers
- Our Events
- Secarma Labs
- Case Studies
- News
- Secarma Labs Archive
- Blog Archive
- Past Events
- Archive
- National Cyber Security Show 2021
- UnLocked London Olympia
- The Future of Cyber Security
- Terms & Conditions
- Partner with Secarma
- Partnership
- CE Plus Downloads
- Using Visual Studio Code Extensions for Persistence
- Escaping Restricted Shell through Insecure Consul API
- Bypassing Android’s RootBeer Library (Part 2)
- What is Ransomware?
- What’s the Difference Between a Vulnerability Scan and a Pentest?
- Internet of Things (IoT) Security Checklist
- Your Business May Be All IoT, but is it Secure?
- Data: The New Pollution?
- Do You Believe in Cybersecurity?
- 5 Cybersecurity Questions You Must Ask Yourself
- 3 Security Challenges for Data-Led Companies
- Cybersecurity Doesn’t Come from a Box with Flashing Lights
- Cryptojacking: What You Need to Know
- Keeping Your Intellectual Property Secure
- Smishing: Everything You Need to Know
- Improving Your Security Mindset
- The Unusual Cyber Attack Routes You Need to Consider
- The Importance of Patching
- Beware the Share: When Social Media Gets Too Social
- FinTech: The Next Big Target for Hackers?
- When Cybersecurity Meets Physical Security
- 8 Cybersecurity Questions You Need to Ask Your Suppliers
- Supply Chain Security: Are Your Suppliers Secure?
- A Brief History of Supply Chain Attacks
- Protecting Your Business from a Supply Chain Attack
- Hacking Back – Why It’s a Bad Idea
- Cybersecurity for SMEs
- “What You Don’t Know Can’t Hurt You” Doesn’t Apply to Cybersecurity
- How Do You Improve Your Cybersecurity? Think CIA
- Are Unknown Devices the Way in to Your Organisation?
- Preparing Yourself for a Successful Red Team
- Equifax Autopsy: What Have We Learned?
- Your Security Awareness Training Isn’t Working
- A Look at the History of Malware and a Prediction for the Future
- Cybersecurity Risk Management: What Are You Doing to Reduce the Risk of a Breach?
- Security Protections: How Do You Lock Down Your Systems?
- Covid-19 Business Update: We're Continuing to Provide You with Cybersecurity Solutions
- Performing Internal Infrastructure Testing Remotely
- Charity Support Fund
- Remote Working Security Lessons to Take into 2021
- Introducing Our New Security Training Courses
- Chaining Vulnerabilities for Account Takeover
- New Year, New Cybersecurity Threat? …Not Exactly
- Testing Compiled Applications
- Deepfakes: Harmless Fun or Serious Security Threat?
- Understanding Common SSL/TLS Misconfigurations
- Will Your Business Embrace Remote Working Post-Lockdown?
- 01/03/2021: Cybersecurity & Tech News Roundup
- Ransomware: An Evolving Threat
- 02/03/2021: Cybersecurity & Tech News Roundup
- 03/03/2021: Cybersecurity & Tech News Roundup
- 04/03/2021: Cybersecurity & Tech News Roundup
- Ransomware: Protecting Your Business from an Evolving Enemy
- 05/03/2021: Cybersecurity & Tech News Roundup
- 08/03/2021: Cybersecurity & Tech News Roundup
- 09/03/2021: Cybersecurity & Tech News Roundup
- 10/03/2021: Cybersecurity & Tech News Roundup
- 11/03/2021: Cybersecurity & Tech News Roundup
- 12/03/2021: Cybersecurity & Tech News Roundup
- 15/03/2021: Cybersecurity & Tech News Roundup
- 16/03/2021: Cybersecurity & Tech News Roundup
- 17/03/2021: Cybersecurity & Tech News Roundup
- Three ways of using MSBuild to beat CrowdStrike
- 18/03/2021: Cybersecurity & Tech News Roundup
- 19/03/2021: Cybersecurity & Tech News Roundup
- A Bit About Dynamic Data Exchange (DDE)
- BSIDES Glasgow CTF
- [Tool Release] BURPEXTENDERFORGE
- CHUNKYTUNA - A Web Shell Evolved
- Decrypting MOLE02 Part One – Malware Profile
- Decrypting MOLE02 Part Two – Universal Decryption Tool
- EXPLODINGCAN: A Vulnerability Review
- Hacking with GIT: GIT-Fingerprint Tool Release
- Hacking with GIT: GIT-SHELL Proof of Concept
- Hacking with GIT: GIT-ENUM Metasploit Module Release
- Hacking with GIT: The Video
- INDUSTROYERS
- In (Zero) Days Gone By – Part 1 – Magento Unauthenticated SQLI (CVE-2011-4781)
- Is Dynamic Data Exchange (DDE) Injection a Thing?
- Pandwarf in a KALI VM on a Windows Host
- Setting Service Principal Names to Roast Accounts
- SoHopelessly Broken 0-day Strategy
- SSRS Attacks Part 1 – Dynamic Data Extraction
- SSRS Attacks Part 2 – Building an Empire
- Uploading Files to RDP, NVC, or Anywhere You Can Type
- Using Machine Account Passwords During an Engagement
- Using NetBeans GUI Designer to Make Pretty Burp Extenders
- ExploitDev: WOOCOMMERCE PHP Object Injection
- Cyber Attacks: What If You’re the Only Target?
- Barriers to Improving ICS Security
- Conducting a Passive ICS Test
- Protecting Your Industrial Control Systems
- Testing your Cybersecurity
- Understanding Cybersecurity
- WannaCry: The World’s First Global Ransomware Attack
- WannaCry: What Next?
- Software Security: A Developer's Point of View - Part One
- Software Security: A Developer's Point of View - Part Two
- How to Reduce the Cost of Developing Your Software
- Petya (or NotPetya) – Another Global Ransomware Attack
- It’s Time for a Geneva Convention on Cyber Warfare
- Secarma Scores Big at Global Hacking Convention
- What We Learned by Winning at DEFCON
- Wi-Fi on KRACK
- The Secarma Halloween Hackathon
- Our Hacking Day with ITV News
- Stuxnet: The Day Industrial Control Systems Became a Target
- GDPR – The Perfect Time to Start Improving Your Cybsersecurity
- Cybersecurity – Where Does the Responsibility Lie?
- The True Cost of an ICS Attack
- Spectre and Meltdown: What Does it Actually Mean?
- Glasgow University Cyber Defence Exercise
- The True Nature of Cyber-Attacks
- Is Security Taking a Backseat to Innovation?
- Is Your Industrial Internet of Things (IIoT) Really Secure?
- Industrial Control Systems – The Threat in Stats
- ICS Security – The Five Key Benefits of Having a Network Map
- You Don’t Want to End Up in the News
- The Cyber Threats from “Unknown Assets”
- Secarma Sponsors Best Cyber Breakthrough Award at the Scottish Cyber Awards 2018
- Secarma Backs NCSC Government CyberFirst Initiative
- 22/03/2021: Cybersecurity & Tech News Roundup
- 23/03/2021: Cybersecurity & Tech News Roundup
- 24/03/2021: Cybersecurity & Tech News Roundup
- 25/03/2021: Cybersecurity & Tech News Roundup
- 26/03/2021: Cybersecurity & Tech News Roundup
- 29/03/2021: Cybersecurity & Tech News Roundup
- 30/03/2021: Cybersecurity & Tech News Roundup
- 31/03/2021: Cybersecurity & Tech News Roundup
- 01/04/2021: Cybersecurity & Tech News Roundup
- 12/04/2021: Cybersecurity & Tech News Roundup
- 13/04/2021: Cybersecurity & Tech News Roundup
- 14/04/2021: Cybersecurity & Tech News Roundup
- 15/04/2021: Cybersecurity & Tech News Roundup
- 16/04/2021: Cybersecurity & Tech News Roundup
- 19/04/2021: Cybersecurity & Tech News Roundup
- Process Injection Part 1: The Theory
- 20/04/2021: Cybersecurity & Tech News Roundup
- 21/04/2021: Cybersecurity & Tech News Roundup
- Process Injection Part 2: Modern Process Injection
- 22/04/2021: Cybersecurity & Tech News Roundup
- 23/04/2021: Cybersecurity & Tech News Roundup
- 26/04/2021: Cybersecurity & Tech News Roundup
- 27/04/2021: Cybersecurity & Tech News Roundup
- 28/04/2021: Cybersecurity & Tech News Roundup
- 04/05/2021: Cybersecurity & Tech News Roundup
- Bypassing Windows Defender with Environmental Decryption Keys
- 05/05/2021: Cybersecurity & Tech News Roundup
- 10/05/2021: Cybersecurity & Tech News Roundup
- 11/05/2021: Cybersecurity & Tech News Roundup
- 12/05/2021: Cybersecurity & Tech News Roundup
- 13/05/2021: Cybersecurity & Tech News Roundup
- 14/05/2021: Cybersecurity & Tech News Roundup
- 19/05/2021: Cybersecurity & Tech News Roundup
- 18/05/2021: Cybersecurity & Tech News Roundup
- 17/05/2021: Cybersecurity & Tech News Roundup
- 20/05/2021: Cybersecurity & Tech News Roundup
- 21/05/2021: Cybersecurity & Tech News Roundup
- 24/05/2021: Cybersecurity & Tech News Roundup
- 25/05/2021: Cybersecurity & Tech News Roundup
- The Final Boss: Cybercrime in Gaming
- Non-Profit Sector Pro Bono Penetration Test Case Study
- Cybersecurity for Charities: Is Your Non-Profit At Risk?
- Collaborative Penetration Test Case Study
- Join us at the NCSS
- UnLocking Birmingham's Security Industry
- Cyber Security for Charities: Strengthening Your Security Posture
- Join us at the International Cyber Expo
- Cybersecurity Events in the Capital
- Cybersecurity Misconceptions
- vISM Case Study: Working in Close Partnership with LedgerEdge
- Security Essentials Series – Changes to Cyber Essentials Coming in 2023
- Security Essentials Series - 80% of Cyber Threats are Protected by Cyber Essentials
- Security Essentials Series – Why is Cyber Essentials good for GDPR?
- Security Essentials Series – Vulnerability Scans vs Penetration Tests
- Understanding Cyber Essentials Certification
- Getting Started with Cyber Essentials Certification: Building a Secure Future
- Understanding & implementing the 5 security controls
- Preparing for the CE Assessment
- Cyber Essentials Plus Assessment
- Cyber Essentials Guide Summary
- IoT Cybersecurity Challenges and Solutions
- Improving Critical Infrastructure Cybersecurity
- Ecommerce Cybersecurity Best Practices
- Education Data Protection: GDPR and Beyond
- The beginners guide to Planning Penetration Testing Projects
- Enhancing Employee Awareness: Cybersecurity Training for E-commerce Staff
- The Future of Penetration Testing: Trends and Changes
- Vulnerability Scanning Unveiling Hidden Weaknesses in Fintech Infrastructure
- Building a Resilient Cybersecurity Culture in Educational Institutions
- Understanding the Importance of Fintech Penetration Testing
- Online Learning Cybersecurity: Ensuring Safe Remote Education
- Navigating Cross-Border E-commerce Cybersecurity Challenges
- IOT Self-Statement of Compliance for PSTI?
- The Role of AI in Cybersecurity Friend or Foe
- Securing Financial Transactions in the Digital Age
- Healthcare Cyber Security Challenges: Protecting Patient Data
- Fintech Cybersecurity Consultation and its Role in Innovation
- The Human Factor: Psychology of Cybersecurity Awareness
- Next-Gen Firewalls: Defending Against Advanced Threats
- The Cloud's Silver Lining: Ensuring Data Security in Cloud Environments
- Emerging Ransomware Threats: Evolution and Prevention
- Cybersecurity in Retail: Protecting Customer Data and Transactions
- Ethical Hacking: Unveiling the Positive Side of Penetration Testing
- Resources
- The growing threat of IoT cyber-attacks – what you need to know.
- Questionnaire
- Customer Feedback - Tell us how we did
- Retailers v Ransomware: Round 2025
- Ransomware in Retail: Lessons from Real-World Attacks
- Explore Our Cybersecurity Video Library
- Downloads
- Penetration Testing 102: Web and Mobile Risks in the Real World
- Penetration Testing 101: Why Humans Still Matter
- Is IoT the Weakest Link in Cybersecurity?
- The Weakest Link: Why Humans Are Still the Biggest Cybersecurity Risk
- Ask the Assessor: Your Cyber Essentials Questions Answered
- Demystifying Cyber Essentials: Your Step-by-Step Guide to Certification Success
- Cyber Essentials Made Easy Pack
- Cyber Essentials - Whats in Scope Infographic
- Cybersecurity Services
- Secarma BASEfund
- Trust But Verify: Getting Supplier Security Right
- Cyber Essentials & Cyber Essentials Plus – Your Certification Guide
- IoT Cyber Scheme – Baseline, Assurance & PSTI Compliance Guide
- Identify Your Weakest Link – Security Risk Guide
- Penetration Testing 101 – Why Human Expertise Still Matters
- Strengthen Your Security – Password Policy Guide
- Cyber Essentials Implementor Training – In-Person Workshop
- Grow Your Business Through Cybersecurity
- Beyond Pentesting: The Value of Red Teaming and Adversary Simulation
- Events
- The Future of Cyber Security – Manchester
- The Future of Cyber Security – Newcastle
- International Cyber Expo – London
- A Beginner’s Guide to Implementing ISO 27001
- Securing Your IoT Devices: A Guide to IoT Cybersecurity 101
- Beyond Pentesting: Red Teaming & Adversary Simulation
- ISO 27001: Practical First Steps
- Secarma at the Resilient IoT + Trustable AI Conference 2025
- Cybersecurity Wrap-Up 2025: Lessons Learned and What’s Next
- DORA: What We’re Seeing and Hearing
- Cyber Brief: Ivanti, Gladinet and Oracle Breaches
- Cyber Brief: Oracle Exploit Alert, UK Nursery Arrests, and JLR Fallout
- Cyber Brief: Ivanti, Gladinet and Oracle Breaches
- Cyber Brief: 7-Zip Flaws, GoAnywhere Exploited and UK OT Risk
- Cyber Brief: NCSC Surge, Windows 10, SonicWall and Android Risks
- Cyber Brief: Capita Fine, Microsoft Zero-Days & More
- ISO 27001: Getting Started with Information Security
- Educating Your Team While Achieving Cyber Essentials
- Cyber Essentials – are you a Trusted Supplier?
- Cyber Essentials and Small Businesses
- Ten Years of Cyber Essentials
- Cyber Essentials Protects Against 98.8% of Common Cyber Attacks
- Cyber Essentials = Free Cyber Insurance
- Cyber Brief: F5 Directive, UK Incidents, Windows Issue, Retail Breach
- Cyber Brief: Oracle Patch, Microsoft Update, UK Incident Rise
- Cyber Brief: UK Incident Surge & Business Leader Confidence Gap
- Cyber Essentials – Question Set 2025
- Cyber Brief: UK Contractor Breach, Email Mishandling & Cloud Outage
- Cyber Brief: UK economy hit, ransomware bill, data-law reform
- Terms and Conditions (October 2025)
- Cyber Brief: F5 Post-Breach & CISA Exploited Vulnerabilities
- Cyber Brief: Apple Zero-Day Patches and Open-Source Supply-Chain Risks
- Cyber Brief: WSUS zero day, car output falls, gaming attacks
- Cyber Essentials for Legal Aid Providers
- Cyber Brief: Gmail disruption, fuel-system flaws & grid ransomware
- Cyber Essentials Certification Made Simple
- Cyber Brief: Gmail credential claims, ICS vulnerabilities, global threat surge
- Cyber Brief: Azure Outage, Lottery Exposure, npm Malware, Email Risk
- Cyber Brief: CISA Patches, NCSC Guidance and Supply-Chain Risks
- Cyber Brief: DeFi hack, Windows GDI RCE, HttpTroy backdoor
- Cyber Brief: ICO Encryption, Ransomware and Linux Alert
- Cyber Brief: Nikkei breach, Records leak, firefighter data exposed
- Has your new setup been configured securely?
- Do you need a Configuration Review, a Penetration Test – or both?
- Cyber Essentials Made Simple: Understanding the Process
- Cyber Brief: Hyundai breach, cloud risks, Nevada ransomware
- Cyber Brief: supply chain surge, CBO breach, cloud identity failures
- Empower Your Team with Secarma Engage
- Cyber Brief: Oracle hack, VS Code malware, hotel phishing
- Is Your Security Strategy Ready for 2026?
- How Well Do You Know Your Security Processes?
- Is your cybersecurity strategy ready?
- Cyber Brief: Samsung zero-day, Zoom patches, identity risk
- Cyber Brief: UK cyber law plans, Patch Tuesday, NHS data notices
- DORA Intro: What We’re Seeing and Hearing Webinar