top of page


2025: That’s a Wrap!
As the final pixels of 2025 settle, the team here at BlueHat Cyber wanted to take a quick breather to say a massive thank you to everyone who has been part of our journey this year. It’s been a whirlwind of a second year. We’ve spent the last twelve months helping businesses across the UK navigate an increasingly complex digital landscape with ever expanding regulatory requirements. If 2024 was about finding our feet, 2025 was about hitting our stride. A Year of Growth Lookin
Dec 31, 20252 min read


Update your Apple devices now!
Apple has just released a critical software update for MacOS, iOS and iPadOS. This update addresses a serious security vulnerability...
Aug 21, 20251 min read


Exciting News: BlueHat Cyber Has a New Home
We're thrilled to share some exciting news – we've officially opened our brand-new office! You can now find us in the Regus building ...
Jun 8, 20251 min read


A Greener Future: Making an Impact
At BlueHat Cyber, we're not just passionate about protecting your digital world – we're also committed to nurturing the physical one....
Apr 28, 20251 min read


Supporting World Autism Acceptance Month
At BlueHat Cyber, we believe in the power of understanding and the importance of creating a more inclusive world for everyone. That's why...
Apr 17, 20251 min read


New Social Media Accounts
Excited to announce that we have (finally) decided to dive into the ever growing cesspit that is social media. Hopefully we'll be able to...
Mar 10, 20251 min read


Are Non-Human Identities Exposing Your Business?
What are Non-Human Identities? Non-human identities (NHIs) are digital identities that represent applications, services, devices, or...
Feb 17, 20252 min read


Hidden Dangers Lurking in Your Browser: A Guide to Extension Security
Browser extensions have become indispensable tools for enhancing productivity and streamlining our online experience. From ad blockers...
Jan 2, 20253 min read


Celebrating One Year in Business!
It's hard to believe it's been a whole year since BlueHat Cyber first began its mission to provide top-tier cybersecurity solutions to...
Nov 20, 20241 min read


Over 400,000 DrayTek Routers vulnerable to two new critical vulnerabilities
A total of 14 vulnerabilities affecting DrayTek Vigor routers were disclosed yesterday in a report by Forescout . The vulnerabilities...
Oct 14, 20241 min read


ACSC: Best Practices for Event Logging and Threat Detection
The latest publication from the Australian Cyber Security Centre (ACSC) outlines essential strategies to enhance security through robust...
Aug 27, 20242 min read


Enhancing Web Security with OWASP Secure Headers
In the evolving landscape of web security, ensuring that your web application is protected against vulnerabilities is paramount. The...
Aug 4, 20241 min read


The Great CrowdStrike Crash and How to Fix It
A recent faulty update from the cyber security company CrowdStrike resulted in widespread Windows system crashes, impacting businesses...
Jul 22, 20242 min read


Security Alert for Authy Users: Update Your App
Twilio has discovered a security vulnerability in the Authy app due to an unauthenticated endpoint exposing user data, including phone...
Jul 5, 20241 min read


Protect Your Domains from Impersonation: Essential Anti-Spoofing Controls
Email spoofing, where attackers impersonate legitimate senders to deceive recipients, poses a significant threat to organisations and...
Jul 1, 20242 min read


Enhance Your Cybersecurity with NCSC's "Exercise in a Box"
In today's digital landscape, robust cybersecurity measures are essential for every organization. The UK's National Cyber Security Centre...
Jun 25, 20241 min read


New PHP Vulnerability Exposes Windows Servers to Remote Code Execution
A critical PHP vulnerability (CVE-2024-4577) impacting Windows servers allows remote code execution. Discovered by DEVCORE, this CGI...
Jun 17, 20241 min read


What is the PSTI act?
The PSTI act (Product Security and Telecommunications Infrastructure Act), aims to raise standards for manufacturers of smart (internet...
May 8, 20241 min read


Understanding Powershell Execution Policy
What is PowerShell Execution Policy? PowerShell Execution Policy is a security feature that determines the conditions under which...
Apr 29, 20242 min read


CrushFTP Critical Vulnerability (CVE-2024-4040)
A vulnerability has been discovered in CrushFTP, a popular piece of software used for file sharing using secure protocols. The zero-day...
Apr 27, 20241 min read
bottom of page
