5 Signs You May Been Hacked!

Well there are many attack vectors that cyber criminals can use to acquire access to systems and personal information most of them can be placed into only a few method types. 1. Direct access from brute force attack or DDOS ect (this is when an attacker finds information about your business or personal information online […]

The Real Cost of the MetaVerse

The Red Blog, Open Wallets, Worthless Virtual Land and so much more! The shift of trust with our personal data has taken a dark twist recently, with tech companies and big pharmaceutical under the spotlight. From virtual gang rape on the Facebook Meta VR platform, where multiple avatars attacked Nina Jane Patel, to the already […]

Could your Alexa kill you?

Red Blog Cyber With the rise of A.I technology and the Internet of things or IOT everything becomes linked to the Internet and therefore a risk from hackers. From automated Self driving cars being taken over and crashing into Walls. To home security systems being hacked, Even your own fridge linked to your bank account. […]

What is blockchain security?

Red Blog Cyber, What is blockchain security? Blockchain security is a comprehensive risk management system for a blockchain network, using cybersecurity frameworks, assurance services and best practices to reduce risks against attacks and fraud. Quote taken from the IBM website on cyber security and blockchain. Red Team Physical and Forced Entry Consultants have been working […]