Ransomware attacks continue to escalate across the global cyber threat environment. From ransomware as a service operations and double extortion tactics to large scale data theft campaigns targeting critical infrastructure organisations, ransomware threats are now affecting organisations of every size. If you’re reading this because you think you have experienced a ransomware incident and are […]
Inside Embargo: the ransomware operation built to blind your defences before encryption
Embargo has emerged as one of the more operationally dangerous ransomware groups currently active, not because of unusually sophisticated encryption, but because of how effectively it suppresses endpoint visibility before encryption even begins. Recent intrusion analysis shows Embargo operators using Safe Mode boot manipulation, vulnerable driver abuse, and tailored EDR-killing tooling to disable security controls […]
5 cyber security mistakes UK SMEs still make in 2026
Cyber threats are evolving quickly, but many UK SMEs are still being caught out by the same avoidable mistakes. From weak passwords and outdated systems to poor backup practices and missing incident response plans, many businesses are leaving gaps that threat actors actively look for. The issue is not always a lack of security tools. […]
Zero trust architecture explained: why it matters and how it works
Cyber security has never been more important, but it has also never been more complex. For years, organisations relied on a simple idea. Keep the outside world out, and everything inside the corporate network can be trusted. That approach made sense when systems were on-site, users worked in offices and network boundaries were clearly defined. […]
What is smishing?
You are mid-morning, halfway through a cup of tea, when your phone buzzes. It is Royal Mail, apparently, letting you know there is a package waiting and that you owe £2.99 to rebook the delivery. The link looks plausible enough. The message sounds exactly like something Royal Mail would send. So you tap it. This […]
How often should a business do a penetration test?
If you have already had one pen test and are wondering when to schedule the next one, you are asking exactly the right question. Many businesses conduct penetration testing as a one-time exercise, something to tick off before a client audit or a compliance deadline, and then quietly forget about it. That approach leaves a […]
Should you pay a ransomware demand?
If your organisation has been hit by ransomware, contact Zensec immediately before making any payment decisions. Our team is available around the clock. When a ransomware attack occurs, someone in your organisation will inevitably ask the question. The files are locked, operations are grinding to a halt, and a ransom note is sitting on every […]
Phishing resistant MFA: what it is and why it matters
Phishing attacks remain one of the most common ways attackers gain access to business systems. Even with multi factor authentication in place, many organisations are still vulnerable to credential theft, session hijacking, and social engineering. This is where phishing resistant MFA becomes critical. It is not simply an improvement on traditional MFA. It is a […]
Inside Apt73: when ransomware branding matters more than ransomware
When an organisation is named on a ransomware leak site, the immediate question is usually whether a breach has occurred. In practice, the more difficult question is often whether you can prove that it has not. Apt73 is a case study in that distinction. The group, also tracked as Eraleig and later Bashe, does not […]
How long does a penetration test take?
It is one of the most common questions we hear from businesses considering penetration testing services, and it is entirely reasonable to ask. Whether you are trying to plan around a compliance deadline, need to assess your risk, fit the work into your IT team’s schedule, or simply understand what you are committing to, knowing […]











