Skip to content
Zensec Lemon - transition logo from Solace CyberZensec Ink - transition logo from Solace Cyber
  • Ransomware data recovery
  • Top ransomware groups
  • About
  • Contact
0333 091 7040
National Cyber Security Centre logo for Zensec
National Cyber Security Centre logo for Zensec
Zensec Lemon - transition logo from Solace CyberZensec Ink - transition logo from Solace Cyber
  • Services
    • Assess
      • Cyber Incident Response Plan
      • Cyber Security Risk Assessment
      • Penetration Testing
      • Ransomware Readiness Assessment
      • Top ransomware groups
    • Protect
      • Managed Firewall Services
      • Managed Network Security
      • Patch Management Service
      • Remote Worker Security
      • Security Hardening
      • Vulnerability Management
      • Wi-Fi Security Service
    • Detect
      • Cloud XDR Services
      • Cyber Threat Intelligence
      • Managed Endpoint Detection & Response (MDR)
      • Indicator of Compromise Monitoring (IOC)
      • Security Information & Event Management (SIEM)
    • Respond
      • Business Email Compromise Response
      • Digital Forensics and Incident Response (DFIR)
      • PII Data Investigation
    • Recover
      • Disaster Recovery
      • Microsoft 365 Backup
      • Ransomware Data Recovery
      • Secure Backup
    • Train
      • Cyber Security Awareness Training
      • Phishing Simulation Training
  • Company
    • About us
    • Blog
    • Case Studies
    • News
    • Contact us
      • 24/7 Emergency: 0333 091 7040
      • Contact
  • Contact
0333 091 7040
National Cyber Security Centre logo for Zensec
National Cyber Security Centre logo for Zensec
Zensec standard lemonZensec standard ink
  • Services

    Services

    Assess

    • Cyber Incident Response Plan
    • Cyber Security Risk Assessment
    • Cyber Threat Intelligence Report
    • Ransomware Readiness Assessment
    • Penetration Testing
    • Red Teaming
    • Open Source Intelligence (OSINT)
    • Top Ransomware Groups
    • Continuous Adversarial Simulation

    Protect

    • Managed Firewall
    • Managed Network Security
    • Patch Management
    • Remote Worker Security
    • Security Hardening
    • Vulnerability Management
    • Wi-Fi Security

    Detect

    • Managed Endpoint Detection & Response (MDR)
    • Cloud Extended Detection & Response (XDR)
    • Security Information & Event Management (SIEM)
    • Endpoint Detection & Response (EDR)
    • Network Indicator of Compromise Monitoring (IOC)
    • Cyber Threat Intelligence
    • Purple Teaming
    • Blue Teaming

    Respond

    • Business Email Compromise Response
    • Digital Forensics & Incident Response (DFIR)
    • PII Data Investigation

    Recover

    • Disaster Recovery
    • Data Recovery
    • Microsoft 365 Backup
    • Ransomware Data Recovery
    • Secure Backup

    Train

    • Cyber Security Awareness Training
    • Phishing Simulation Training
  • Company

    Company

    About us

    • About us
    • Blog
    • Case studies
    • News

    Contact us

    • 24/7 Emergency: 0333 091 7040
    • Request a callback
  • Contact
0333 091 7040
National Cyber Security Centre logo for Zensec
National Cyber Security Centre logo for Zensec

Blog

  • Home
  • Blog
Cyber Security, Insights, Ransomware

Global ransomware statistics 2026: The data behind the rising threat

11th May 2026

Ransomware attacks continue to escalate across the global cyber threat environment. From ransomware as a service operations and double extortion tactics to large scale data theft campaigns targeting critical infrastructure organisations, ransomware threats are now affecting organisations of every size. If you’re reading this because you think you have experienced a ransomware incident and are […]

Soc team monitoring dashboard
Business, Cyber Security, Insights, Ransomware

Inside Embargo: the ransomware operation built to blind your defences before encryption

8th May 2026

Embargo has emerged as one of the more operationally dangerous ransomware groups currently active, not because of unusually sophisticated encryption, but because of how effectively it suppresses endpoint visibility before encryption even begins. Recent intrusion analysis shows Embargo operators using Safe Mode boot manipulation, vulnerable driver abuse, and tailored EDR-killing tooling to disable security controls […]

Creative Team in Office
Business, Cyber Security, Insights

5 cyber security mistakes UK SMEs still make in 2026

6th May 2026

Cyber threats are evolving quickly, but many UK SMEs are still being caught out by the same avoidable mistakes. From weak passwords and outdated systems to poor backup practices and missing incident response plans, many businesses are leaving gaps that threat actors actively look for. The issue is not always a lack of security tools. […]

Automatic turnstile at the entrance. Tripod turnstile with electronic card reader is closed.
Cyber Security, Insights, Strategy

Zero trust architecture explained: why it matters and how it works

1st May 2026

Cyber security has never been more important, but it has also never been more complex. For years, organisations relied on a simple idea. Keep the outside world out, and everything inside the corporate network can be trusted. That approach made sense when systems were on-site, users worked in offices and network boundaries were clearly defined. […]

Woman holding a cup of coffee, sitting by the window in the morning.
Business, Insights, Ransomware

What is smishing?

29th April 2026

You are mid-morning, halfway through a cup of tea, when your phone buzzes. It is Royal Mail, apparently, letting you know there is a package waiting and that you owe £2.99 to rebook the delivery. The link looks plausible enough. The message sounds exactly like something Royal Mail would send. So you tap it. This […]

Businesswoman with laptop sitting on the sofa and looking away in office
Business, Cyber Security, Insights

How often should a business do a penetration test?

27th April 2026

If you have already had one pen test and are wondering when to schedule the next one, you are asking exactly the right question. Many businesses conduct penetration testing as a one-time exercise, something to tick off before a client audit or a compliance deadline, and then quietly forget about it. That approach leaves a […]

Person making a card payment
Business, Insights, Ransomware, Recovery

Should you pay a ransomware demand?

24th April 2026

If your organisation has been hit by ransomware, contact Zensec immediately before making any payment decisions. Our team is available around the clock. When a ransomware attack occurs, someone in your organisation will inevitably ask the question. The files are locked, operations are grinding to a halt, and a ransom note is sitting on every […]

Man using phone to authenticate access
Business, Insights, Ransomware

Phishing resistant MFA: what it is and why it matters

22nd April 2026

Phishing attacks remain one of the most common ways attackers gain access to business systems. Even with multi factor authentication in place, many organisations are still vulnerable to credential theft, session hijacking, and social engineering. This is where phishing resistant MFA becomes critical. It is not simply an improvement on traditional MFA. It is a […]

Boardroom table with documents
Business, Insights, Ransomware

Inside Apt73: when ransomware branding matters more than ransomware

20th April 2026

When an organisation is named on a ransomware leak site, the immediate question is usually whether a breach has occurred. In practice, the more difficult question is often whether you can prove that it has not. Apt73 is a case study in that distinction. The group, also tracked as Eraleig and later Bashe, does not […]

Man reviewing risk dashboards
Compliance, Business, Cyber Security, Insights

How long does a penetration test take?

15th April 2026

It is one of the most common questions we hear from businesses considering penetration testing services, and it is entirely reasonable to ask. Whether you are trying to plan around a compliance deadline, need to assess your risk, fit the work into your IT team’s schedule, or simply understand what you are committing to, knowing […]

Posts pagination

1 2 … 10 Next

Search

Categories

  • Artificial Intelligence (1)
  • Business (61)
  • Compliance (7)
  • Cyber Security (75)
  • Insights (43)
  • Ransomware (42)
  • Recovery (6)
  • Strategy (29)
  • Uncategorised (6)

Recent posts

  • Global ransomware statistics 2026: The data behind the rising threat
  • Soc team monitoring dashboard
    Inside Embargo: the ransomware operation built to blind your defences before encryption
  • Creative Team in Office
    5 cyber security mistakes UK SMEs still make in 2026

Tags

Business Cyber Security ROI
Zensec Logo - Lemon

We help UK businesses recover from ransomware attacks and data breaches.

National Cyber Security Centre logo for Zensec
NCSC Cyber Advisory logo
Our services
  • Ransomware data recovery
  • Top ransomware groups
Company
  • About us
  • Blog
  • News
Get in touch
  • hello@zensec.co.uk
  • 0333 091 7040
Follow us

UK · Dubai · Australia

Our awards
Cyber insurance awards europe winners 2025
Cyber insurance awards badge
Fortinet award logo
Our accreditations
Crest Incident Response Badge
Vulnerability Assessment Badge
Pen Testing Accreditation badge
CREST Member Badge

© Zensec 2025. All Rights Reserved.

  • Terms & Conditions
  • Privacy Policy

Loading Comments...