An easy recipe for identity fraud – Post a dream job LinkedIn advert on behalf of almost any employer
Learn how LinkedIn job posting feature can be attacked by threat actors to carry out identify fraud campaigns
Every once a while we share latest information about threats, attacks tips & tricks to help our users. No salesy spam. Read our Privacy Policy
Threat repoerts, articles, checklists, mistakes to avoid.
Stay up to date
No salesy pitches!
"*" indicates required fields
Learn how LinkedIn job posting feature can be attacked by threat actors to carry out identify fraud campaigns
Understand why physical penetration testing is important for businesses to find out their physical security blind spots and attack prevention methods.
Understand what is data leakage and how it affects an organisation. Read about examples of data leaks and prevention methods to build cyber resilience.
What are advanced persistent threats? Understand the malicious nature, techniques and threat of APTs is crucial to your cyber security defence.
Understand what is data security breach, examples and measures to avoid breaches and loss of personal sensitive data. Read here.
Understanding examples and differences between encryption and hashing and salting. Discover good practices around secure storage of sensitive data.
Manchester
F1, Kennedy House,
31 Stamford St,
Altrincham WA14 1ES
London
71-75, Shelton Street,
Covent Garden,
London, WC2H 9JQ