Skip to main content
2025 Cyber Round-Up: The Threat Evolution

2025 Cyber Round-Up: The Threat Evolution

Stay ahead of the curve with this month’s Cyber Risk Newsletter, your essential briefing on the evolving threat landscape.

Why Hackers Love Christmas as much as the rest of Us

Why Hackers Love Christmas as much as the rest of Us

The Christmas trading period brings huge opportunity, but it also brings heightened cyber risk.

Changing Your MDR Provider – Your Essential Checklist

Changing Your MDR Provider – Your Essential Checklist

This checklist is designed to make changing your managed detection and response (MDR) provider a smooth, secure, and efficient process: turning a potential disruption into a confident, well-managed upgrade.

What if Your Security Service Provider Can No Longer Support You?

What if Your Security Service Provider Can No Longer Support You?

Operational resilience isn’t tested when everything works - it’s tested the moment your security service provider can no longer support you.

Schrodinger’s Hack – or How HSBC Was(n’t) Hacked

Schrodinger’s Hack- or How HSBC Was(n’t) Hacked

When a bank is hacked it can quickly generate extensive news coverage. And recent events have shown that even when a bank isn’t hacked it can still generate significant column inches – threatening reputational damage.

Data Breaches Surge Across All Sectors, Exposing Sensitive Data and Reducing Digital Trust

Data Breaches Surge Across All Sectors, Exposing Sensitive Data and Reducing Digital Trust

Stay ahead of the curve with this month’s Cyber Risk Newsletter, your essential briefing on the evolving threat landscape.

The Rising Cyber Threat to Private Equity

The Rising Cyber Threat to Private Equity

Deep and Dark Web Intelligence: The Thomas Murray Threat Intelligence team investigates how cybercriminals seeking access to capital, data and influence by exploiting the technology and trust within private equity

11 Ways Businesses Can Reduce Their Cyber Insurance Premiums

11 Ways Businesses Can Reduce Their Cyber Insurance Premiums

This checklist will help you to assess the aspects of your organisation that can be optimised to reduce your cybersecurity insurance premiums.

Cyberattacks Cripple Critical Infrastructure and AI-generated Deepfake Phishing – Cyber Series: September 2025

Ransomware Attack Cripples Polish Hospitals, Raising Concerns Over Critical Infrastructure Security

Stay ahead of the curve with this month’s Cyber Risk Newsletter, your essential briefing on the evolving threat landscape.

Compliance-Driven Extortion

Compliance-Driven Extortion: How Cyber Criminals are Exploiting Poor Governance

Deep and Dark Web Intelligence: The Thomas Murray Threat Intelligence team investigates how cyber criminals are exploiting regulatory non‑compliance to aid in executing their cyber attacks.