Pages
- Home
- Home – English
- Services
- Services
- Blog
- Blog
- Contact Us
- Contact Us – English
- Videos
- Accreditations & Industry Recognition
- Accreditations & Industry Recognition
- How We Calculate Our Score
- How We Calculate Our Score
- Whitepapers
- Whitepapers
- Clients & Case Studies
- Clients & Case Studies
- Risk-Based Vulnerability Management
- Cyber Security Jobs & Careers
- Cyber Security Jobs & Careers
- How We Protect You
- How We Protect You
- Cyber Threat Intelligence
- Cyber Threat Intelligence
- Third-Party Risk Management
- Third-Party Risk Management
- Our Approach
- Our Approach
- Why Orpheus?
- Why Orpheus?
- Privacy Policy
- Privacy Policy
- Terms of Website Usage
- Terms of Website Usage
- Cookie Policy
- Cookie Policy
- Sitemap
- Sitemap
- Intelligence-Led Security Testing
- Intelligence-Led Security Testing
- Cyber Insurance Solutions
- Cyber Insurance Solutions
- Regulatory Compliance
- Regulatory Compliance
- About Orpheus
- About Us
- Solutions
- Partners
- Partners
- Request Demo
- Intelligence Summaries
- Contact Us – Softcat Webinar
- External Attack Surface Management
- Verified Scoring Methodology
- Cyber Insurers and Brokers
- Managed Service Providers / SOC & Threat Intelligence Teams
- DPOs and Compliance Teams
- Chief Information Security Officers (CISOs)
- IT Directors / Infrastructure Owners
- Procurement and Risk Managers
- Investment Managers
- Financial Services Organisations
- Thank You
- Router
Posts
- Our Tencent(s) on the battle royale to exploit interest in the Fortnite Android app
- Orpheus data shows downward trend in zero-day use in nation-state operations
- Don’t ex-Spectre media coverage to Foreshadow the most potent vulnerabilities
- Orpheus present the CTIPS guide to cyber threat intelligence
- Hasta la Visa, baby: chatbots gone rogue
- Rude Awakening: Dream Market set to shut down
- Trickle-Treat: How Threat Actors Benefit From the Trickle-Down of Capabilities
- Orpheus selects Alpha Generation as its UK Distribution Partner
- BLOG SERIES: The Balkanisation of the Internet I
- GDPR fines take off, highlighting the importance of a threat-led approach
- The Balkanisation of the Internet Blog Series Part II – The inconsistent application of GDPR
- Hacktivists take Eastern Europe by storm
- The Balkanisation of the Internet Blog Series Part III – Brazil, India, and WhatsApp: A case study for tech decolonisation
- BLOG SERIES: The Balkanisation of the Internet Part IV: From SORM to Sovereign: Russia’s digital surveillance and cybercrime
- Black Friday Highs and Woes: how cybercriminals exploit this season’s best deals
- Cyber Security in the Healthcare Supply Chain
- Current Cyber Security in NHS Suppliers
- Digital Health Magazine Cyber Security Round Up
- A Nasty Surprise in Supplies: Monitoring Your Supply Chain in the Wake of the Travelex Ransomware Incident
- The Implications of Rising US-Iran Tensions for Businesses
- LORCA announces largest cohort of cybersecurity innovators
- Why Diversity is Important in Analytical Teams
- NEW Cyber Security Feature for NHS Procurement Platform, The Edge4Health
- NHS adds supplier security audits to procurement platform – Computer Weekly press coverage
- NHS SBS adds cyber security function to The Edge4Health – UK Authority press coverage
- SBS adds cyber function to Edge4Health platform – Health Business press coverage
- New cyber security feature for NHS procurement platform – BBH press coverage
- Cybersecurity feature integrated to NHS procurement platform – Med-Tech press coverage
- Cyber security news round-up – Digital Health press coverage
- Orpheus 2020 Forecast
- The increasing cyber-threat to the supply chain, and how to secure yours – SC Magazine press coverage
- BLOG – Beyond phishing – Coronavirus’ wider impact on the threat landscape
- A day in the life of Anita Bielicka, Orpheus’ Cyber Threat Intelligence
- BLOG – COVID-19 response sees increase in potentially exploitable attack surface
- WEBINAR: How Secure Are Your Supply Chains? Join us on 7th May 2020 10am
- WEBINAR: Register for our next webinar on 28th April 10.30am.
- BLOG – Second Order Effects of COVID-19 on the Attack Surface
- WEBINAR: Register for our next webinar on 23rd June 12pm.
- WEBINAR: Join the next City and Financial webinar series – Orpheus is on the panel for webinar one 25th June 12pm.
- Orpheus – AI & Machine Learning for predictive cyber risk management
- BLOG: Why are big-game hunting ransomware groups targeting remote access vulnerabilities?
- Which remote access vulnerabilities are targeted by ransomware groups and why? – SC Magazine press coverage
- BLOG: COVID’S Metamorphoses: a pandemic’s long-term impact on the cyber threat landscape – an introduction to the series
- BLOG: COVID’s Metamorphoses part I: nation-state activity in the era of vaccine nationalism
- BLOG: COVID’s Metamorphoses part II: A world disrupted: the consequences of the “retreat of globalisation” for nation-state cyber threats
- THE LORCA REPORT 2020: MAKING OF AN ECOSYSTEM
- BLOG: Beyond the scam: geopolitical implications of the Twitter hack
- BLOG: COVID’s Metamorphoses part III: Cybercrime during the “Great Lockdown” recession
- BLOG: COVID’s Metamorphoses part IV: insider threats, nation-state cybercrime and cyber security budgets during the “Great Lockdown” Recession
- BLOG: COVID’s Metamorphoses Part V: The regulatory and legislative challenge
- NEW TECHNOLOGY DEPLOYED TO COMBAT CYBER SECURITY THREAT IN RETAIL – press release
- Virtualstock integrates integrates Orpheus Cyber Risk Rating score onto retail platform – Tamebay press coverage
- BLOG: Ransom-where? The past, present and future of encrypt and leak ransomware operations
- Healthcare cyber security feature comes to retail – Ret@il Technology press coverage
- Newcastle University ransomware infection – what happened and why?
- How to ensure supply chains are cyber proof and secure? – Retail Tech Innovation Hub press coverage
- test page 1
- BLOG: Poor attack surface management means the threat from targeted ransomware persists
- BLOG: The UK’s Outrage Against The ‘Fatima’ Advert
- BLOG: The Importance Of Threat-Led Patch Prioritisation
- BLOG: US’ National Security Agency List of 25 Vulnerabilities That Chinese State Actors Are Scanning For and Exploiting
- BLOG: Biden Their Time – The Cyber Threats To The US Election and Their Wider Consequences
- Blog: Future of Threats Against Connected Devices
- BLOG: Gone Phishing
- What Do The Regulators Say About Third Party Risk?
- ‘You’re hired!’ The rise of corporate hack-for-hire groups
- BLOG: The Privacy Risks Of Smart TVs
- BLOG: Black Friday 2020 – What Are The Risks?
- BLOG: Computer Security Day – What Precautions Should You Take?
- 12 Vulnerabilities of Christmas- CVE-2019-0708 A.K.A BlueKeep
- 12 Vulnerabilities of Christmas- CVE -2020-5902
- BLOG: 12 Vulnerabilities of Christmas CVE-2020-10189
- FireEye breach sees release of red-team tools
- BLOG: 12 Vulnerabilities of Christmas – CVE-2020-0796 A.K.A SMBGhost
- BLOG: 12 Vulnerabilities of Christmas CVE -2019-11510
- BLOG: 12 Vulnerabilities of Christmas CVE-2017-5638
- BLOG: 12 Vulnerabilities of Christmas- CVE-2020-0688
- BLOG: 12 Vulnerabilities of Christmas – CVE-2019-10149
- BLOG: 12 Vulnerabilities of Christmas CVE-2019-19781
- 12 Vulnerabilities of Christmas- CVE-2017-0199
- BLOG: 12 Vulnerabilities of Christmas – CVE-2019-3396
- BLOG: 12 Vulnerabilities of Christmas – CVE -2019-2725
- BLOG: 2021 Predictions
- BLOG: 2020 predictions in review
- BLOG: Ticketmaster To Pay $10 Million Fine Over Hacking Scandal
- BLOG: Whatsapp’s New Privacy Policy
- BLOG: Understanding Third Party Risk
- BLOG: WhatsApp Delays Controversial Privacy Update
- BLOG: Why are big-game hunting ransomware groups targeting remote access vulnerabilities?
- BLOG: New Wormable Android Malware Spreading Through WhatsApp
- BLOG: Continuous Risk Monitoring
- BLOG: Makop RaaS Campaign targets South Korean Entities
- BLOG: What Is STAR-FS?
- STAR-FS Accreditation Announcement
- BLOG: Remote Working Causing Data Breach Fatigue
- BLOG: Valentine’s Day Phishing Scams
- BLOG: Danger Of Ads & PUAs
- BLOG: What are the benefits of a STAR-FS?
- BLOG: 30,000 Macbooks Infected By New “Silver Sparrow” Malware
- BLOG: Increase in QuickBooks Data Spear-Phishing Attacks
- BLOG: Why Diversity Is Crucial For Threat Intelligence Teams
- BLOG: How close are we to closing the gender diversity gap?
- BLOG: Using your voice as a woman in cybersecurity
- BLOG: COVID 19’s Impact on Women In Cyber
- BLOG: Third-Party Risk Management Guidance
- BLOG: What Is Cloud Security?
- Orpheus Cyber Shortlisted For Best Use Of Machine Learning/AI By SC 2021 Awards Europe
- BLOG: How Machine Learning and AI can be used to prevent cyberattacks
- BLOG: Main Cloud Security Issues and Threats in 2021
- BLOG: How Orpheus Cyber Approaches Cyber Risk Ratings
- BLOG: How Security Intelligence Improves Cloud Security
- BLOG: The Escalating Concern About Ransomware
- BLOG: Fuel Pipeline Cyber Attack Causes US To Declare Emergency
- BLOG: Who is DarkSide?
- Achilles partners with Orpheus to offer supply chain cyber risk management and intelligence
- BLOG: Colonial Pipeline Operations ‘Back to Normal’ As DarkSide Shuts Down
- BLOG: Microsoft Informs About Data Stealing Malware That Acts As Ransomware
- BLOG: Energy Firms Rush to Buy Cyber Insurance
- BLOG: Malvertising Campaign Distributes Malicious AnyDesk Installer
- BLOG: Researchers Expose Malware Trick Used To Bypass Antivirus Software
- BLOG: JBS S.A. Falls Victim To Ransomware Attack
- BLOG: Who is REvil/Sodinokibi?
- BLOG: Should Organisations Pay Ransom Demands?
- Orpheus Cyber Wins ‘Best Use Of Machine Learning/AI’ At SC 2021 Awards Europe
- BLOG: The Evolution of Ransomware
- BLOG: Why is Third-Party Risk Management Crucial?
- BLOG: What role do cryptocurrencies play in ransomware?
- CASE STUDY: UKRI x Orpheus Cyber
- BLOG: How Ransomware-As-A-Service Works
- BLOG: Common Third-Party Risk Management Concerns
- BLOG: What is Maze Ransomware?
- BLOG: Who is RYUK?
- BLOG: Star-Fs & CBest Compared
- BLOG: UK Government Requests Views on Supply Chain Cybersecurity
- BLOG: The Importance of Supply Chain Risk Management
- BLOG: The Most Routinely Exploited Vulnerabilities of 2020 & 2021
- BLOG: Respect in Security Pledge
- BLOG: How Important Is Continuous Risk Monitoring?
- BLOG: Supply Chain Attacks Expected To Quadruple In 2021
- BLOG: How Artificial Intelligence and Machine Learning Help Cybersecurity In 2021
- BLOG: Why Vulnerability Management Crucial to Managing Third-Party Cyber Risk & How Orpheus Cyber Can Help
- BLOG: Why is a Third-Party Risk Management Budget Important?
- BLOG: How Are Vulnerabilities Defined?
- BLOG: Is Cryptojacking On The Rise Again?
- BLOG: The Rise Of Stalkerware
- BLOG: What Is Pegasus?
- BLOG: Ragnar Locker New Tactic
- BLOG: The Return Of REvil
- BLOG: Pharming vs Phishing
- BLOG: NatWest’s £320m Money-Laundering Fine
- BLOG: The Dangers of QR Codes
- BLOG: DDoS Attacks on Online Gamers and How to Prevent Them
- BLOG: UK Ransomware Attacks Have Doubled In A Year
- BLOG: How Secure Is Two Factor Authentication?
- BLOG: Cybersecurity Weaknesses In The Financial Industry
- PRESS RELEASE: Orpheus Cyber x Cyber Runway
- BLOG: How Black Friday Impacts Businesses
- BLOG: What is Magecart/E-Skimming?
- BLOG: Insider Threats In the Healthcare Sector
- BLOG: Wiper Malware
- BLOG: What Are The Signs Of A Phishing Attempt?
- BLOG: US and Israel Announce Joint Cybersecurity Task Force
- BLOG: Biggest Cyber Risks Threatening the United States
- BLOG: The Growing Threat of Cyberattacks
- BLOG: Cyberattacks on the United States Government
- BLOG: Threat Actors – Every Day Is Valentine’s Day
- BLOG: The Security and Vulnerability Management Market Size Estimated To Be Worth $15.86 Billion by 2030
- BLOG: Why Cybersecurity Needs Diversity & Inclusion
- BLOG: Third-Party Risk Management Lifecycle
- BLOG: Suspected state front FreeCivilian publishes Ukrainian government data after DDoS and wiper attacks
- BLOG: Women In Cyber – What Progress Are We Making?
- BLOG: Vendor Risk Management
- PRESS RELEASE: City Corporation launches new cyber security innovation challenge supported by Microsoft
- BLOG: How Cyber Risk Ratings Are Building Real Time Cybersecurity
- BLOG: Reducing Cyber Risk When Doing Business with a New Vendor
- BLOG: How Cyber Risk Ratings Can Help MSPs Protect Businesses from Data Breaches
- BLOG: Understanding Cyber Risk
- BLOG: How Vulnerable MSP’s Are to Threat Actors
- BLOG: How Continuous Risk Monitoring of Supply Chains is Key to Every Business
- BLOG: Risk Compliance – How Organisations can keep safe and avoid penalties
- What To Do When Your Cyber Insurance Policy Doesn’t Cover You For A Critical Attack?
- IntSum – Week 35 | 29th August – 2nd September 2022
- IntSum – Week 35 | 29th August – 2nd September 2022
- IntSum – Week 36 | 5th – 9th September 2022
- BLOG: Orpheus Cyber Is One Of Six UK-based Startups Chosen To Participate In AWS Defence Accelerator
- BLOG: FBI, CISA and MS-ISAC Issues Cybersecurity Warning For Educational Sector
- IntSum – Week 37 | 12th – 16th September 2022
- BLOG: The NCSC Releases guidance on protection retailers can take to prevent attacks
- Week 39 | 26th – 30th September 2022
- Week 40 | 3rd – 7th October 2022
- BLOG: Threat Actors Smishing Via UK Gov Energy Bills Support Scheme
- PRESS RELEASE: Aravo and Orpheus Cyber Partner
- Week 41 | 10th – 14th October 2022
- Week 42 | 17th – 21st October 2022
- BLOG: Small Businesses Vulnerable To Cyber Attacks
- Week 43 | 24th – 28th October 2022
- Week 44 | 31st Oct– 4th Nov 2022
- Week 45 | 7th – 11th November 2022
- Week 46 | 14th – 18th November 2022
- Week 47 | 21st – 25th November 2022
- Threat intelligence weekly update | 2nd December 2022
- Threat intelligence weekly update | 9th December 2022
- Threat intelligence weekly update | 16th December 2022
- BLOG: Seasonal Cyber Threats to the Retail Sector
- Threat intelligence weekly update | 23rd December 2022
- Threat intelligence weekly update | 30th December 2022
- Threat intelligence weekly update | 6th January 2023
- Cyber Threat Intelligence Weekly Update: 13th January 2023
- BLOG: Cyber Risk Ratings Without Questionnaires
- BLOG: The Growing Need for Cyber Threat Intelligence in Today’s Digital Age
- BLOG: What Is A Cyber Risk Score And Why You Should Care About It
- BLOG: Navigating the Complexities of Threat-Led Ratings
- Cyber Threat Intelligence Weekly Update: 20th January 2023
- BLOG: How AI Is Leveraged Across The Threat Landscape
- Cyber Threat Intelligence Weekly Update: 27th January 2023
- Cyber Threat Intelligence Weekly Update: 6th February 2023
- BLOG: The Hidden Dangers of Cybersecurity – Protecting Your Business from Online Threats
- Cyber Threat Intelligence Weekly Update: 10th February 2023
- BLOG: The Dark Side of Cupid – The Motives of Cyber Threat Actors on Valentine’s Day
- CTI Weekly: US hospital chain first to disclose data breach following GoAnywhere compromise
- CTI Weekly: HardBit ransomware demands insurance details to facilitate negotiations
- CTI Weekly: EX-22 allows malware to spread in corporate networks
- BLOG: The Growing Challenge of Controlling Third-Party Risk in a Global Economy
- BLOG: The Female Cyber Security Revolution – How Women are Transforming the Industry
- CTI Weekly: HiatusRAT malware is targeting business-grade routers to collect intelligence
- BLOG: Latitude Financial Hack – What Do We Know So Far?
- CTI Weekly: Increasingly extreme extortion tactics leveraged by ransomware groups
- CTI Weekly: Ransomware group adds 53 companies to its leak site within 48 hours
- BLOG: Protect Your Organization – The Importance of Implementing a Risk-Based Vulnerability Management Program
- CTI Weekly: New supply chain campaign leverages the popular 3CX VOIP desktop client
- BLOG: Patching The Reserved – Highly Exploitable Kernel Bugs in Purgatory
- CTI Weekly: Insight into Russian cyber-industrial complex, Easter phishing lures, UNC4466’s activities and Genesis Market seized
- BLOG: Mitigating Financial and Reputational Losses Through Third-Party Risk Regulation
- BLOG: The Future of Cyber Risk Rating: Implications for Regulators and Financial Institutions
- CTI Weekly: US Intelligence Leak Links Russia to Threat Actors
- BLOG: Incident Response and Business Continuity – Preparing for the Worst with Risk Based Vulnerability Management
- BLOG: Beyond Firewalls and Antivirus Software – Why Orpheus Cyber Risk Ratings are Stronger for Small Businesses
- BLOG: Best Practices for Managing and Mitigating Third-Party Risks – Lessons Learned
- BLOG: The ROI of Cyber Risk Ratings for MSPs
- CTI Weekly: 3CX breach highlights the risk of cascading supply chain compromises
- BLOG: Cyber Risk Tailored to Your Needs – The Flexibility of Orpheus Cyber Risk Ratings for Small Businesses
- BLOG: Why Insurers Should Use Cyber Risk Ratings to Improve Underwriting
- BLOG: Automated Vulnerability Scanning: Pros, Cons, and Best Practices
- BLOG: The Role of CVE Prioritisation in Compliance and Risk Management
- CTI Weekly: Ethical hackers take over ESA satellite, paperCut vulnerability exploited for data theft, Indian insurance regulator potential breach, LockBit targets Indian loans provider and more
- BLOG: Data-Driven Cyber Risk Ratings – The More Accurate and Reliable Assessment for Small Businesses
- BLOG: Communicating the Business Value of Risk-Based Vulnerability Management to Stakeholders
- BLOG: Leveraging Technology to Enhance Your Third-Party Risk Management Program
- BLOG: Why CVE Vulnerability Prioritisation Should Be Part of Every MSPs Client’s Cybersecurity Strategy
- CTI Weekly: LockBit RaaS claims supply chain breach of 60+ companies; SpecTor operation nabs 288 dark web drug trade suspects; FBI seizes illicit crypto exchange websites; and more cybersecurity news
- BLOG: Integrating Risk-Based Vulnerability Management into Your IT Security Framework
- BLOG: Beyond Compliance – How Cyber Risk Ratings Can Drive a Culture of Cybersecurity in Regulated Industries
- BLOG: The Benefits of Third-Party Cyber Risk Ratings Over Self-Reported Data
- BLOG: The Importance of Continuous Risk Monitoring – Maintaining Cybersecurity for Small Businesses
- CTI Weekly: NSA warns of sophisticated Russian cyber espionage tool ‘Snake’; new phishing tool ‘Greatness’ bypasses MFA; financial fraud campaign targets Italian banks; Akira ransomware hits corporate networks and more
- BLOG: Challenges and Solutions in Implementing a Risk-Based Vulnerability Management Program
- BLOG: Streamlining Third-Party Risk Management with Cyber Risk Ratings – Enhancing Security and Efficiency
- BLOG: How Cyber Risk Ratings Can Help Regulators Stay Ahead of the Curve
- CTI Weekly: Indictment of Russian Citizen Linked to Major Ransomware – USD 10M Reward, Cybercrime Challenges & Espionage Revelations
- BLOG: Taking the Lead – How Cyber Risk Ratings Give MSPs a Competitive Edge
- BLOG: Key Components of an Effective Third-Party Risk Management Programme
- BLOG: The Power of Cyber Threat Intelligence – How It Can Protect Your Business
- CTI Weekly: Chinese State-Sponsored Threat Actor Engages in Targeted Intelligence Gathering, New Ransomware Campaign by FIN7, Manufacturing Sector Breaches & Compromises
- BLOG: The Future of Regulation – Embracing Cyber Risk Ratings for Effective Oversight
- BLOG: Exploring How Outsourcing Amplifies Cyber Risks
- CTI Weekly: Hacktivist Group Expands Tactics to Extortion, Zero-Day Vulnerability Exploited, AlphV Ransomware Upgrade
- BLOG: Making Informed Decisions – Enhancing Third-Party Risk Management with Cyber Risk Ratings
- BLOG: Mitigating Risk Exposure – The Benefits of Cyber Risk Ratings for Small Teams
- BLOG: Leveraging Cyber Threat Intelligence – Strengthening Managed Service Providers’ Defense Against Emerging Threats
- CTI Weekly: Deep Fake Video of Putin Address and Cyber Threats Amidst Ukrainian Counter-Offensive, State-Linked Malware, Ransomware Campaigns, and Banking Security Concerns
- BLOG: The Power of a Comprehensive Cyber Risk Rating System for Organizations
- BLOG: Why Accurate Cyber Risk Ratings are Essential for Insurer Success
- CTI Weekly: Zero-Day Vulnerability Exploited by Ransomware Groups & CISA Directive on Network Device Security
- BLOG: Know Your Threats- Leveraging External Attack Surface Management for Cyber Defence
- CTI Weekly: Important Updates – Clop Ransomware, Anonymous Sudan DDoS, Russian Threat Actors, and VMWare Security Advisory
- BLOG: Unveiling the Dire Consequences of Inadequate Cybersecurity Measures for Organizations
- BLOG: Cyber Risk Ratings – Fostering Transparency and Accountability in Cybersecurity Regulation
- CTI Weekly: Threat actors claiming to be affiliated with PMC Wagner target Russian entities
- BLOG: Integrating Vulnerability Management into Your IT Security Framework
- BLOG: The Potential Consequences of Cyber Attacks – Why Small Businesses Need to Take Cybersecurity Seriously
- BLOG: Managed Service Providers – How Risk-Based Vulnerability Management Can Help Protect Your Clients
- CTI Weekly: Important Updates -Anonymous Sudan Claims Microsoft Data Theft, MOVEit Data Theft Campaign, ALPHV Malware Distribution, Port of Nagoya Ransomware Attack, DDoS Alerts, Google Analytics Risks
- BLOG: From Vulnerabilities to Vendor – Prioritising Third-Party Risk with Cyber Risk Ratings
- BLOG: Challenges and Solutions in Implementing a Risk-Based Vulnerability Management Program
- BLOG: Assessing an Organisation’s Cybersecurity Posture – The Importance of Cyber Risk Ratings
- BLOG: How Cyber Risk Ratings Improve Regulatory Fairness
- BLOG: Enhancing Third-Party Risk Management with Cyber Risk Ratings
- BLOG: Limitations of Traditional Security Assessments and How Cyber Risk Ratings Offer a More Comprehensive View
- BLOG: Protecting Your Clients, Scaling Your Business – The Power of Cyber Risk Ratings for MSPs
- BLOG: The Consequences of Inadequate Cybersecurity Measures for Organisations
- BLOG: Using Cyber Threat Intelligence to Identify and Counter Advanced Persistent Threats (APTs)
- BLOG: Outsmarting Cyber Adversaries – A Closer Look at External Attack Surface Management
- BLOG: The Growing Demand for Cyber Insurance and the Competitive Edge of Offering Ratings
- BLOG: The Intersection of Cyber Threat Intelligence and Risk-Based Vulnerability Management
- BLOG: Optimising Cyber Insurance Policy Pricing – The Risk-Reducing Power of Cyber Risk Ratings
- BLOG: Understanding Your External Attack Surface
- BLOG: How Proactive Cyber Threat Intelligence Fortifies Risk Mitigation
- BLOG: Orchestrating Remediation Efforts with Risk-Based Strategies
- BLOG: The Impact of External Attack Surface Management on Cybersecurity Strategy
- BLOG: The Anatomy of a Third-Party Data Breach – Understanding the Vulnerabilities
- BLOG: The Value of Cyber Risk Ratings for Regulatory Bodies
- BLOG: How Cyber Threat Intelligence Enhances Incident Response and Recovery
- BLOG: Consistent and Standardised Cyber Risk Assessments – Real-World Examples of Improved Decision-Making
- BLOG: The MSP Advantage – How Cyber Risk Ratings Enhance Offerings and Client Relationships
- BLOG: Leveraging Risk Intelligence in Vulnerability Management
- BLOG: Risk vs. Reward – Striking the Balance in Third-Party Relationships with Cyber Risk Ratings
- How Cyber Risk Ratings Revolutionise Regulatory Preparedness
- BLOG: Securing Your Digital Perimeter with Actionable External Attack Surface Intelligence
- BLOG: Navigating Emerging Risks with Cyber Threat Intelligence
- BLOG: How Cyber Risk Intelligence Empowers Insurer Risk Assessment
- BLOG: How Cyber Risk Ratings Empower Regulatory Vigilance
- BLOG: Risk Intelligence Revolution – Cyber Ratings Redefine Insurance Risk Management
- BLOG: Small Team, High Stakes – Elevating Cybersecurity through Actionable Risk Insights
- BLOG: Building Trust through Advanced Third-Party Risk Assessment
- BLOG: The Impact of Cyber Risk Intelligence on Insurer Value Propositions
- BLOG: Redefining Limits – Cyber Risk Ratings as Catalysts for Small Team Security Triumphs
- BLOG: Insights into the Sophisticated World of State-Sponsored Cyber Attacks
- BLOG: Transforming Regulatory Approaches with Cyber Risk Ratings
- BLOG: Strengthening Cyber Defence with External Attack Surface Management
- BLOG: How Cyber Risk Ratings Transform Security for Small Teams
- BLOG: Cryptojacking Unveiled – Detecting and Combating the Stealthy Threat of Mining Malware
- BLOG: Elevating SMB Cybersecurity with Risk-Based Strategies
- BLOG: Fortifying Business Defences – Navigating the Threat of Supply Chain Compromise in Cybersecurity
- BLOG: Mastering CBEST – The Power of Intelligence Led Pen-Testing for Financial Institutions
- BLOG: Decrypting Cyber Threat Intelligence – How Insights Empower Proactive Security
- BLOG: Mitigating Cyber Supply Chain Attacks – Insights from the NCSC Warning
- BLOG: Streamlining Vulnerability Management with Cyber Risk Ratings
- BLOG: Amplifying Defence for Small Teams – Cyber Risk Ratings Against Significant Threats
- BLOG: RBVM’s Influence on Business Continuity and Resilience
- BLOG: Enhancing Vendor Security Assessments – Key Focus Areas for Assessors
- BLOG: Vulnerability Lifecycle Management – Best Approaches
- BLOG: The Role of Attack Surface Reduction in Cybersecurity
- BLOG: The Cybersecurity Regulatory Landscape – Challenges and Solutions
- BLOG: Building Effective Incident Response Plans
- BLOG: Empowering Managed Security Services Analysts – Navigating Threat Landscapes
- BLOG: Optimising Threat Response with Advanced Attack Surface Analysis
- BLOG: Cupid’s Guide to Cybersecurity – Strengthening Your Digital Defenses
- BLOG: A Closer Look at Cyber Risk Ratings and Policy Evaluation
- BLOG: Cybersecurity and Governance – Aligning Strategies for GRC Specialists
- BLOG: Championing Diversity in Cybersecurity – Honouring International Women’s Day
- BLOG: Navigating Cybersecurity Excellence – Understanding the NIST Cybersecurity Framework 2.0
- BLOG: Part 2 – Enhancing Supply Chain Resilience with the Updated NIST Cybersecurity Framework 2.0
- BLOG: Beyond the Contract – Strengthening Vendor Partnerships
- BLOG: Inside the Mind of Cyber Threat Actors – Understanding Behaviour
- BLOG: Deciphering DORA – Transforming Cyber Resilience in Financial Services
- BLOG: From Scans to Solutions – Enhancing Vulnerability Management with Cyber Risk Ratings
- BLOG: Turning the Tables on Attackers – Leveraging Cyber Risk Ratings for Comprehensive Defence
- BLOG: Elevating Underwriting Accuracy – The Role of Cyber Risk Ratings in Insurance Risk Assessment
- Storm-1811 – A Deep Dive into a Notorious Threat Actor
- BLOG: Zero-Day Exploits – What They Are and How They Affect Cybersecurity
- BLOG: The Role of Automation in RBVM – Enhancing Efficiency and Accuracy
- BLOG: The Role of Threat Intelligence in External Attack Surface Discovery
- BLOG: From Gaps to Governance – Strengthening Compliance with Cyber Risk Ratings
- BLOG: Prioritising Vulnerabilities with Limited Resources
- BLOG: Building a Proactive Security Strategy
- BLOG: Assessing Cyber Risk for Insurance Policies – Key Considerations
- BLOG: Risk Mitigation Strategies for Third-Party Management
- BLOG: Threat Monitoring – Leveraging Our Platform for Proactive Security
- BLOG: Integrating Cyber Risk Ratings into Your Security Framework
- BLOG: Guide to Evaluating Vendor Security – Leveraging Our Platform
- Orpheus Cyber Featured in Lockton Re’s Groundbreaking Report on Cyber Risk Scoring Technologies
- BLOG: Patch Smarter, Not Harder – Prioritising Vulnerabilities
- BLOG: US Eye Clinic Suffers Data Breach Impacting 92,000 Patients
- BLOG: Biden Signs Two Bills to Enhance Government Cybersecurity
- BLOG: Why Cybersecurity Needs To Be A Priority For The Education Sector
- BLOG: Are Smaller Organisations Less At Risk Of Cybersecurity Attacks?
- BLOG: What Are Vulnerabilities?
- BLOG: Choosing The Right Vendor
- Intelligence Summary
- Intelligence Summary
- Intelligence Summary
- Intelligence Summary
- Intelligence Summary
- Intelligence Summary
- Intelligence Summary
- Intelligence Summary
- INTELLIGENCE SUMMARY
- INTELLIGENCE SUMMARY
- INTELLIGENCE SUMMARY
- INTELLIGENCE SUMMARY
- Intelligence Summary
- Intelligence Summary
- Intelligence Summary
- Intelligence Summary
- Intelligence Summary
- Intelligence Summary
- Intelligence Summary
- Intelligence Summary
- Intelligence Summary
- Intelligence Summary
- Intelligence Summary
- Intelligence Summary
- Intelligence Summary
- Intelligence Summary
Accreditations
Case Studies
Reviews
Services
- External Attack Surface Management
- External Attack Surface Management
- Third Party Risk Management
- Third Party Risk Management
- Intelligence-led security testing
- Intelligence-led security testing
- Training & capacity building
- Training & capacity building
- Investigations & research
- Investigations & research
- Advisory Services
- Advisory Services
- Intelligence-Driven Training
- Intelligence-Driven Training
- Bespoke Intelligence Solutions
- Bespoke Intelligence Solutions
- The Only Government-Accredited Threat Intelligence Provider Offering Award-Winning Cyber Risk Ratings
- The Only Government-Accredited Threat Intelligence Provider Offering Award-Winning Cyber Risk Ratings
Whitepapers
- Cybersecurity Threats Facing the Legal Sector
- 2023 Cyber Threat Landscape Review and Looking Forward into 2024
- Cybersecurity Threat Landscape and Resilience in Europe: a toolkit for organisations operating in the EU and the UK
- Cybersecurity of Operational Technology and Industrial Control Systems
- Israel Palestine Cyber Threat Analysis Report
- The Importance of Cybersecurity in Scientific Industry, Research and Development
- Introduction to External Attack Surface Management
- Emerging Nation-State Actors and their Implications for the Future Cyber Threat Landscape
- Combatting Cybercrime: The Ransomware Problem
- How AI is leveraged across the Threat Landscape
- The Evolving Threat of Supply Chain Compromises
- The Great Tech Divide: China’s Battle for Global Dominance
- Cyber Threats to the Energy and Utilities Sector
- ChatGPT: Artificial Intelligence Platform or Malicious Actor Tool?
- A Year in Conflict: Expectations and Realities of Russian Wartime Cyber Operations
- 2022 in Review Cyber Threats to the Healthcare Sector
- Chinese internet censorship and surveillance
- Ministry of Defence Whitepaper
- Russia and Ukraine Threat Analysis Report
- Cyber Threat Facing UK Construction Industry
- A Guide to Threat Actors Whitepaper
- Ransomware Handbook
- Digitalisation of the NHS
- Threat Intelligence Handbook
- Securing your Supply Chain with Threat-led Cyber Risk Ratings
- Adopting a Threat-led approach to patch prioritisation
- UK Financial Services Cyber Threat Forecast 2022