What threats are you missing?

Are traditional security methods enough?

Stay up to date with the SecureValue Blog

Most Recent Articles

From Beach to Breach: How a Relaxed Mind Can Lead to Data Disasters

It’s that time of the year – summer, sun, relaxation and beach holidays and our hero Ben has just returned from not thinking about work for three weeks. Unfortunately, he’s not read this article full of post-holiday cybersecurity tips and he and his em…

US Authorities Seize ‘Rapper Bot’ Malware; Oregon Man Charged

Federal officials dismantled a massive botnet-for-hire operation linked to global cyberattacks and charged its alleged creator.

Alleged developer behind botnet-for-hire identified

The US Department of Justice (DoJ) announced this week that it has ch…

What is AirTag Stalking and How Can You Protect Against It?

The coin-sized tracking devices created by Apple are a lifesaver when it comes to keeping track of keys, wallets, and even luggage when you’re travelling on a long-haul flight.

However, its small size, which makes it easily concealable alongside its t…

The SharePoint Hack – Lessons Learned From 400+ Servers Being Pwned

In this article we’re going to cover what happened with the latest SharePoint vulnerability, who the attackers were and why, the geopolitical ramifications, a reveal of another vulnerability in SharePoint’s sibling, Exchange Server, and what you can do…

Beware of Fake Law Firm Scams Offering to Recover Stolen Crypto Funds

Fraudsters are increasingly posing as lawyers or law firms to scam people who have already fallen victim to an earlier fraud. These fake lawyers claim they can help recover lost money, preying on individuals who are emotionally vulnerable and financial…