This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Resources, Whitepapers and Blog Information
BLOG: The Future of Regulation – Embracing Cyber Risk Ratings for Effectiv...
Wednesday 31st May 2023

BLOG: The Power of Cyber Threat Intelligence – How It Can Protect Your Bus...
Thursday 25th May 2023

BLOG: The ROI of Cyber Risk Ratings for MSPs
Friday 21st April 2023

BLOG: Best Practices for Managing and Mitigating Third-Party Risks – Lesso...
Thursday 20th April 2023

CTI Weekly: US Intelligence Leak Links Russia to Threat Actors
Friday 14th April 2023

BLOG: The Future of Cyber Risk Rating: Implications for Regulators and Financial...
Friday 14th April 2023

CTI Weekly: Ransomware group adds 53 companies to its leak site within 48 hours
Friday 24th March 2023

CTI Weekly: Increasingly extreme extortion tactics leveraged by ransomware group...
Monday 20th March 2023

BLOG: Assessing the Impact of Third-Party Risks on Your Organization
Wednesday 15th March 2023

CTI Weekly: HiatusRAT malware is targeting business-grade routers to collect int...
Friday 10th March 2023

BLOG: The Female Cyber Security Revolution – How Women are Transforming th...
Monday 6th March 2023

BLOG: Navigating the Roadblocks: Overcoming Common Challenges in Risk-Based Vuln...
Wednesday 22nd February 2023

BLOG: What MSPs Should Know about Cyber Threat Intelligence
Monday 20th February 2023

BLOG: Cybercrime on the Rise – Understanding and Defending Against Cyber T...
Thursday 16th February 2023

BLOG: Advancing Diversity and Inclusion in Cyber Security Through Black History ...
Wednesday 15th February 2023

BLOG: The Role of Risk-Based Vulnerability Management Regulations in Ensuring Cy...
Wednesday 8th February 2023

BLOG: How Risk Based Vulnerability Management Can Help Insurers Mitigate Financi...
Thursday 2nd February 2023

BLOG: Vulnerability Prioritization
Monday 30th January 2023

Cyber Threat Intelligence Weekly Update: 27th January 2023
Friday 27th January 2023

BLOG: Why You Should Be Monitoring Your Supply Chain For Breaches
Wednesday 18th January 2023

Threat intelligence weekly update | 6th January 2023
Monday 9th January 2023

BLOG: Threat Actors Targeting MSP Access to Customer Networks
Monday 9th January 2023

BLOG: How Cybercrime is a Regulatory Issue
Thursday 5th January 2023

Threat intelligence weekly update | 30th December 2022
Tuesday 3rd January 2023

Threat intelligence weekly update | 23rd December 2022
Wednesday 28th December 2022

BLOG: Seasonal Cyber Threats to the Retail Sector
Wednesday 21st December 2022

Threat intelligence weekly update | 16th December 2022
Monday 19th December 2022

Threat intelligence weekly update | 9th December 2022
Friday 9th December 2022

BLOG: Black Friday & Cyber Monday 2022 – What Happened?
Wednesday 7th December 2022

Threat intelligence weekly update | 2nd December 2022
Friday 2nd December 2022

Week 47 | 21st – 25th November 2022
Friday 25th November 2022

Week 46 | 14th – 18th November 2022
Friday 18th November 2022

Week 45 | 7th – 11th November 2022
Friday 18th November 2022

Week 44 | 31st Oct– 4th Nov 2022
Tuesday 8th November 2022

BLOG: Infamous Threat Actors – Where Are They Now?
Wednesday 2nd November 2022

Week 43 | 24th – 28th October 2022
Friday 28th October 2022

BLOG: Small Businesses Vulnerable To Cyber Attacks
Wednesday 26th October 2022

BLOG: Threat Actors Targeting MSPs
Wednesday 12th October 2022

BLOG: Who Are Lapsus$ Group?
Tuesday 20th September 2022

BLOG: Data Breaches Rising Throughout 2022
Tuesday 6th September 2022

IntSum – Week 33 | 15th – 19th August 2022
Tuesday 23rd August 2022

BLOG: What Are Vulnerabilities?
Tuesday 26th July 2022

BLOG: Choosing The Right Vendor
Friday 22nd July 2022

BLOG: Why Cybersecurity Needs To Be A Priority For The Education Sector
Wednesday 13th July 2022

BLOG: US Eye Clinic Suffers Data Breach Impacting 92,000 Patients
Monday 11th July 2022

BLOG: Biden Signs Two Bills to Enhance Government Cybersecurity
Tuesday 5th July 2022

BLOG: Risk Compliance – How Organisations can keep safe and avoid penalties
Thursday 9th June 2022

BLOG: How Continuous Risk Monitoring of Supply Chains is Key to Every Business
Tuesday 24th May 2022

BLOG: How Vulnerable MSP’s Are to Threat Actors
Wednesday 11th May 2022

BLOG: Understanding Cyber Risk
Wednesday 4th May 2022

BLOG: How Cyber Risk Ratings Can Help MSPs Protect Businesses from Data Breaches
Wednesday 13th April 2022

BLOG: Reducing Cyber Risk When Doing Business with a New Vendor
Tuesday 5th April 2022

BLOG: How Cyber Risk Ratings Are Building Real Time Cybersecurity
Monday 28th March 2022

PRESS RELEASE: City Corporation launches new cyber security innovation challeng...
Wednesday 23rd March 2022

BLOG: Vendor Risk Management
Wednesday 16th March 2022

BLOG: Women In Cyber – What Progress Are We Making?
Tuesday 8th March 2022

BLOG: Suspected state front FreeCivilian publishes Ukrainian government data aft...
Thursday 24th February 2022

BLOG: Third-Party Risk Management Lifecycle
Thursday 24th February 2022

BLOG: Why Cybersecurity Needs Diversity & Inclusion
Tuesday 22nd February 2022

BLOG: The Security and Vulnerability Management Market Size Estimated To Be Wort...
Thursday 17th February 2022

BLOG: Threat Actors – Every Day Is Valentine’s Day
Friday 11th February 2022

BLOG: Cyberattacks on the United States Government
Friday 28th January 2022

BLOG: The Growing Threat of Cyberattacks
Wednesday 26th January 2022

BLOG: Biggest Cyber Risks Threatening the United States
Monday 24th January 2022

BLOG: US and Israel Announce Joint Cybersecurity Task Force
Monday 17th January 2022

BLOG: What Are The Signs Of A Phishing Attempt?
Monday 17th January 2022

BLOG: Wiper Malware
Friday 14th January 2022

BLOG: Insider Threats In the Healthcare Sector
Thursday 13th January 2022

BLOG: What is Magecart/E-Skimming?
Tuesday 7th December 2021

BLOG: How Black Friday Impacts Businesses
Wednesday 24th November 2021

PRESS RELEASE: Orpheus Cyber x Cyber Runway
Wednesday 17th November 2021

BLOG: Cybersecurity Weaknesses In The Financial Industry
Tuesday 9th November 2021

BLOG: How Secure Is Two Factor Authentication?
Tuesday 2nd November 2021

BLOG: UK Ransomware Attacks Have Doubled In A Year
Tuesday 26th October 2021

BLOG: DDoS Attacks on Online Gamers and How to Prevent Them
Wednesday 20th October 2021

BLOG: The Dangers of QR Codes
Wednesday 13th October 2021

BLOG: NatWest’s £320m Money-Laundering Fine
Wednesday 13th October 2021

BLOG: Pharming vs Phishing
Friday 8th October 2021

BLOG: The Return Of REvil
Monday 13th September 2021

BLOG: Ragnar Locker New Tactic
Tuesday 7th September 2021

BLOG: What Is Pegasus?
Tuesday 7th September 2021

BLOG: The Rise Of Stalkerware
Tuesday 7th September 2021

BLOG: Is Cryptojacking On The Rise Again?
Friday 3rd September 2021

BLOG: How Are Vulnerabilities Defined?
Thursday 2nd September 2021

BLOG: Why is a Third-Party Risk Management Budget Important?
Monday 30th August 2021

BLOG: Why Vulnerability Management Crucial to Managing Third-Party Cyber Risk ...
Tuesday 24th August 2021

BLOG: How Artificial Intelligence and Machine Learning Help Cybersecurity In 202...
Friday 20th August 2021

BLOG: Supply Chain Attacks Expected To Quadruple In 2021
Tuesday 17th August 2021

BLOG: How Important Is Continuous Risk Monitoring?
Thursday 5th August 2021

BLOG: Respect in Security Pledge
Friday 30th July 2021

BLOG: The Most Routinely Exploited Vulnerabilities of 2020 & 2021
Friday 30th July 2021

BLOG: The Importance of Supply Chain Risk Management
Thursday 29th July 2021

BLOG: UK Government Requests Views on Supply Chain Cybersecurity
Thursday 15th July 2021

BLOG: Star-Fs & CBest Compared
Wednesday 14th July 2021

BLOG: Who is RYUK?
Thursday 8th July 2021

BLOG: What is Maze Ransomware?
Thursday 24th June 2021

BLOG: Common Third-Party Risk Management Concerns
Wednesday 23rd June 2021

BLOG: How Ransomware-As-A-Service Works
Tuesday 22nd June 2021

CASE STUDY: UKRI x Orpheus Cyber
Monday 21st June 2021

BLOG: What role do cryptocurrencies play in ransomware?
Thursday 17th June 2021

BLOG: Why is Third-Party Risk Management Crucial?
Tuesday 15th June 2021

BLOG: The Evolution of Ransomware
Monday 14th June 2021

Orpheus Cyber Wins ‘Best Use Of Machine Learning/AI’ At SC 2021 Awar...
Friday 11th June 2021

BLOG: Should Organisations Pay Ransom Demands?
Friday 11th June 2021

BLOG: Who is REvil/Sodinokibi?
Monday 7th June 2021

BLOG: JBS S.A. Falls Victim To Ransomware Attack
Thursday 3rd June 2021

BLOG: Researchers Expose Malware Trick Used To Bypass Antivirus Software
Wednesday 2nd June 2021

BLOG: Malvertising Campaign Distributes Malicious AnyDesk Installer
Friday 28th May 2021

BLOG: Energy Firms Rush to Buy Cyber Insurance
Friday 28th May 2021

BLOG: Microsoft Informs About Data Stealing Malware That Acts As Ransomware
Friday 21st May 2021

BLOG: Colonial Pipeline Operations ‘Back to Normal’ As DarkSide Shut...
Wednesday 19th May 2021

Achilles partners with Orpheus to offer supply chain cyber risk management and i...
Thursday 13th May 2021

BLOG: Who is DarkSide?
Thursday 13th May 2021

BLOG: Fuel Pipeline Cyber Attack Causes US To Declare Emergency
Wednesday 12th May 2021

BLOG: The Escalating Concern About Ransomware
Thursday 6th May 2021

BLOG: How Security Intelligence Improves Cloud Security
Friday 30th April 2021

BLOG: How Orpheus Cyber Approaches Cyber Risk Ratings
Thursday 29th April 2021

BLOG: Main Cloud Security Issues and Threats in 2021
Monday 26th April 2021

BLOG: How Machine Learning and AI can be used to prevent cyberattacks
Friday 23rd April 2021

Orpheus Cyber Shortlisted For Best Use Of Machine Learning/AI By SC 2021 Awards ...
Thursday 22nd April 2021

BLOG: What Is Cloud Security?
Thursday 15th April 2021

BLOG: Third-Party Risk Management Guidance
Tuesday 30th March 2021

BLOG: COVID 19’s Impact on Women In Cyber
Friday 26th March 2021

BLOG: Using your voice as a woman in cybersecurity
Monday 22nd March 2021

BLOG: How close are we to closing the gender diversity gap?
Monday 15th March 2021

BLOG: Why Diversity Is Crucial For Threat Intelligence Teams
Wednesday 3rd March 2021

BLOG: Increase in QuickBooks Data Spear-Phishing Attacks
Thursday 25th February 2021

BLOG: 30,000 Macbooks Infected By New “Silver Sparrow” Malware
Wednesday 24th February 2021

BLOG: What are the benefits of a STAR-FS?
Friday 19th February 2021

BLOG: Danger Of Ads & PUAs
Tuesday 16th February 2021

BLOG: Valentine’s Day Phishing Scams
Saturday 13th February 2021

BLOG: Remote Working Causing Data Breach Fatigue
Thursday 11th February 2021

STAR-FS Accreditation Announcement
Wednesday 10th February 2021

BLOG: What Is STAR-FS?
Wednesday 10th February 2021

BLOG: Makop RaaS Campaign targets South Korean Entities
Wednesday 3rd February 2021

BLOG: Continuous Risk Monitoring
Friday 29th January 2021

BLOG: New Wormable Android Malware Spreading Through WhatsApp
Thursday 28th January 2021

BLOG: Why are big-game hunting ransomware groups targeting remote access vulnera...
Monday 25th January 2021

BLOG: WhatsApp Delays Controversial Privacy Update
Wednesday 20th January 2021

BLOG: Understanding Third Party Risk
Friday 15th January 2021

BLOG: Whatsapp’s New Privacy Policy
Saturday 9th January 2021

BLOG: Ticketmaster To Pay $10 Million Fine Over Hacking Scandal
Wednesday 6th January 2021

BLOG: 2020 predictions in review
Thursday 31st December 2020

BLOG: 2021 Predictions
Wednesday 23rd December 2020

BLOG: 12 Vulnerabilities of Christmas – CVE -2019-2725
Sunday 20th December 2020

BLOG: 12 Vulnerabilities of Christmas – CVE-2019-3396
Saturday 19th December 2020

12 Vulnerabilities of Christmas- CVE-2017-0199
Friday 18th December 2020

BLOG: 12 Vulnerabilities of Christmas CVE-2019-19781
Thursday 17th December 2020

BLOG: 12 Vulnerabilities of Christmas – CVE-2019-10149
Wednesday 16th December 2020

BLOG: 12 Vulnerabilities of Christmas- CVE-2020-0688
Tuesday 15th December 2020

BLOG: 12 Vulnerabilities of Christmas CVE-2017-5638
Monday 14th December 2020

BLOG: 12 Vulnerabilities of Christmas CVE -2019-11510
Friday 11th December 2020

BLOG: 12 Vulnerabilities of Christmas – CVE-2020-0796 A.K.A SMBGhost
Thursday 10th December 2020

FireEye breach sees release of red-team tools
Wednesday 9th December 2020

BLOG: 12 Vulnerabilities of Christmas CVE-2020-10189
Wednesday 9th December 2020

12 Vulnerabilities of Christmas- CVE -2020-5902
Tuesday 8th December 2020

12 Vulnerabilities of Christmas- CVE-2019-0708 A.K.A BlueKeep
Monday 7th December 2020

BLOG: Computer Security Day – What Precautions Should You Take?
Monday 30th November 2020

BLOG: Black Friday 2020 – What Are The Risks?
Thursday 26th November 2020

BLOG: The Privacy Risks Of Smart TVs
Thursday 19th November 2020

‘You’re hired!’ The rise of corporate hack-for-hire groups
Friday 13th November 2020

What Do The Regulators Say About Third Party Risk?
Thursday 12th November 2020

BLOG: Gone Phishing
Tuesday 3rd November 2020

Blog: Future of Threats Against Connected Devices
Thursday 29th October 2020

BLOG: Biden Their Time – The Cyber Threats To The US Election and Their Wider ...
Thursday 29th October 2020

BLOG: US’ National Security Agency List of 25 Vulnerabilities That Chinese Sta...
Tuesday 27th October 2020

BLOG: The Importance Of Threat-Led Patch Prioritisation
Friday 23rd October 2020

BLOG: The UK’s Outrage Against The ‘Fatima’ Advert
Monday 19th October 2020

BLOG: Poor attack surface management means the threat from targeted ransomware p...
Friday 18th September 2020

How to ensure supply chains are cyber proof and secure? – Retail Tech Inno...
Tuesday 15th September 2020

Newcastle University ransomware infection – what happened and why?
Wednesday 9th September 2020

Healthcare cyber security feature comes to retail – Ret@il Technology pres...
Sunday 23rd August 2020

BLOG: Ransom-where? The past, present and future of encrypt and leak ransomware ...
Thursday 20th August 2020

Virtualstock integrates integrates Orpheus Cyber Risk Rating score onto retail p...
Thursday 20th August 2020

NEW TECHNOLOGY DEPLOYED TO COMBAT CYBER SECURITY THREAT IN RETAIL – press ...
Thursday 20th August 2020

BLOG: COVID’s Metamorphoses Part V: The regulatory and legislative challenge
Thursday 30th July 2020

BLOG: COVID’s Metamorphoses part IV: insider threats, nation-state cybercrime ...
Thursday 23rd July 2020

BLOG: COVID’s Metamorphoses part III: Cybercrime during the “Great L...
Monday 20th July 2020

BLOG: Beyond the scam: geopolitical implications of the Twitter hack
Friday 17th July 2020

THE LORCA REPORT 2020: MAKING OF AN ECOSYSTEM
Thursday 9th July 2020

BLOG: COVID’s Metamorphoses part II: A world disrupted: the consequences of th...
Tuesday 7th July 2020

BLOG: COVID’s Metamorphoses part I: nation-state activity in the era of vaccin...
Tuesday 23rd June 2020

BLOG: COVID’S Metamorphoses: a pandemic’s long-term impact on the cyber thre...
Tuesday 23rd June 2020

Which remote access vulnerabilities are targeted by ransomware groups and why? &...
Tuesday 9th June 2020

BLOG: Why are big-game hunting ransomware groups targeting remote access vulnera...
Tuesday 9th June 2020

Orpheus – AI & Machine Learning for predictive cyber risk management
Thursday 4th June 2020

WEBINAR: Join the next City and Financial webinar series – Orpheus is on t...
Wednesday 27th May 2020

WEBINAR: Register for our next webinar on 23rd June 12pm.
Wednesday 27th May 2020

BLOG – Second Order Effects of COVID-19 on the Attack Surface
Thursday 7th May 2020

WEBINAR: Register for our next webinar on 28th April 10.30am.
Friday 24th April 2020

WEBINAR: How Secure Are Your Supply Chains? Join us on 7th May 2020 10am
Thursday 23rd April 2020

BLOG – COVID-19 response sees increase in potentially exploitable attack s...
Monday 6th April 2020

A day in the life of Anita Bielicka, Orpheus’ Cyber Threat Intelligence
Tuesday 24th March 2020

BLOG – Beyond phishing – Coronavirus’ wider impact on the threat l...
Friday 20th March 2020

The increasing cyber-threat to the supply chain, and how to secure yours –...
Thursday 5th March 2020

Orpheus 2020 Forecast
Tuesday 25th February 2020

Cyber security news round-up – Digital Health press coverage
Tuesday 25th February 2020

Cybersecurity feature integrated to NHS procurement platform – Med-Tech pr...
Monday 10th February 2020

New cyber security feature for NHS procurement platform – BBH press covera...
Monday 10th February 2020

SBS adds cyber function to Edge4Health platform – Health Business press co...
Wednesday 5th February 2020

NHS SBS adds cyber security function to The Edge4Health – UK Authority pre...
Tuesday 4th February 2020

NHS adds supplier security audits to procurement platform – Computer Weekl...
Monday 3rd February 2020

NEW Cyber Security Feature for NHS Procurement Platform, The Edge4Health
Monday 3rd February 2020

Why Diversity is Important in Analytical Teams
Friday 24th January 2020

LORCA announces largest cohort of cybersecurity innovators
Tuesday 21st January 2020

The Implications of Rising US-Iran Tensions for Businesses
Thursday 16th January 2020

A Nasty Surprise in Supplies: Monitoring Your Supply Chain in the Wake of the Tr...
Monday 13th January 2020

Digital Health Magazine Cyber Security Round Up
Wednesday 18th December 2019

Current Cyber Security in NHS Suppliers
Tuesday 26th November 2019

Cyber Security in the Healthcare Supply Chain
Tuesday 26th November 2019

Black Friday Highs and Woes: how cybercriminals exploit this season’s best dea...
Tuesday 12th November 2019

BLOG SERIES: The Balkanisation of the Internet Part IV: From SORM to Sovereign: ...
Tuesday 22nd October 2019

The Balkanisation of the Internet Blog Series Part III – Brazil, India, a...
Thursday 5th September 2019

Hacktivists take Eastern Europe by storm
Tuesday 30th July 2019

The Balkanisation of the Internet Blog Series Part II – The inconsistent a...
Tuesday 23rd July 2019

GDPR fines take off, highlighting the importance of a threat-led approach
Wednesday 17th July 2019

BLOG SERIES: The Balkanisation of the Internet I
Tuesday 2nd July 2019

Orpheus selects Alpha Generation as its UK Distribution Partner
Tuesday 2nd July 2019

Trickle-Treat: How Threat Actors Benefit From the Trickle-Down of Capabilities
Tuesday 18th June 2019

Rude Awakening: Dream Market set to shut down
Wednesday 29th May 2019

Hasta la Visa, baby: chatbots gone rogue
Wednesday 29th May 2019

Orpheus present the CTIPS guide to cyber threat intelligence
Wednesday 29th May 2019

Don’t ex-Spectre media coverage to Foreshadow the most potent vulnerabilities
Wednesday 29th May 2019

Orpheus data shows downward trend in zero-day use in nation-state operations
Tuesday 21st May 2019

Our Tencent(s) on the battle royale to exploit interest in the Fortnite Android ...
Tuesday 21st May 2019

Orpheus Cyber appoints Zoe Clark as Director of Channels
Monday 20th May 2019

Get our latest cyber intelligence insights straight into your inbox every week
Fill out the short form below to subscribe to our newsletter so that you never miss out on our cyber intelligence insights and news.