top of page


New Social Media Accounts
Excited to announce that we have (finally) decided to dive into the ever growing cesspit that is social media. Hopefully we'll be able to...
Mar 101 min read


Are Non-Human Identities Exposing Your Business?
What are Non-Human Identities? Non-human identities (NHIs) are digital identities that represent applications, services, devices, or...
Feb 172 min read


Hidden Dangers Lurking in Your Browser: A Guide to Extension Security
Browser extensions have become indispensable tools for enhancing productivity and streamlining our online experience. From ad blockers...
Jan 23 min read


Celebrating One Year in Business!
It's hard to believe it's been a whole year since BlueHat Cyber first began its mission to provide top-tier cybersecurity solutions to...
Nov 20, 20241 min read


Over 400,000 DrayTek Routers vulnerable to two new critical vulnerabilities
A total of 14 vulnerabilities affecting DrayTek Vigor routers were disclosed yesterday in a report by Forescout . The vulnerabilities...
Oct 14, 20241 min read


ACSC: Best Practices for Event Logging and Threat Detection
The latest publication from the Australian Cyber Security Centre (ACSC) outlines essential strategies to enhance security through robust...
Aug 27, 20242 min read


Enhancing Web Security with OWASP Secure Headers
In the evolving landscape of web security, ensuring that your web application is protected against vulnerabilities is paramount. The...
Aug 4, 20241 min read


The Great CrowdStrike Crash and How to Fix It
A recent faulty update from the cyber security company CrowdStrike resulted in widespread Windows system crashes, impacting businesses...
Jul 22, 20242 min read


Security Alert for Authy Users: Update Your App
Twilio has discovered a security vulnerability in the Authy app due to an unauthenticated endpoint exposing user data, including phone...
Jul 5, 20241 min read


Protect Your Domains from Impersonation: Essential Anti-Spoofing Controls
Email spoofing, where attackers impersonate legitimate senders to deceive recipients, poses a significant threat to organisations and...
Jul 1, 20242 min read


Enhance Your Cybersecurity with NCSC's "Exercise in a Box"
In today's digital landscape, robust cybersecurity measures are essential for every organization. The UK's National Cyber Security Centre...
Jun 25, 20241 min read


New PHP Vulnerability Exposes Windows Servers to Remote Code Execution
A critical PHP vulnerability (CVE-2024-4577) impacting Windows servers allows remote code execution. Discovered by DEVCORE, this CGI...
Jun 17, 20241 min read


What is the PSTI act?
The PSTI act (Product Security and Telecommunications Infrastructure Act), aims to raise standards for manufacturers of smart (internet...
May 8, 20241 min read


Understanding Powershell Execution Policy
What is PowerShell Execution Policy? PowerShell Execution Policy is a security feature that determines the conditions under which...
Apr 29, 20242 min read


CrushFTP Critical Vulnerability (CVE-2024-4040)
A vulnerability has been discovered in CrushFTP, a popular piece of software used for file sharing using secure protocols. The zero-day...
Apr 27, 20241 min read


Choosing Secure Passwords: Three Random Words
One of the most common challenges IT users face is creating strong, yet memorable passwords. The National Cyber Security Centre (NCSC)...
Apr 20, 20242 min read


How Cyber Essentials Plus Certification Can Benefit Your Business
In today's digital age, cybersecurity is more important than ever. With the increasing number of cyber threats and data breaches,...
Mar 24, 20242 min read


Top 5 Advanced Security Solutions for Protecting Sensitive Information
With the increasing number of data breaches and cyber attacks, businesses need to take proactive measures to safeguard their data and...
Mar 24, 20242 min read


The Importance of Cybersecurity Consulting
In today's digital landscape, cybersecurity is of utmost importance for businesses to protect their sensitive information and maintain a...
Mar 24, 20242 min read
bottom of page