top of page

The STORM Guidance blog
Cybersecurity insights and guidance
Speak with a cybersecurity specialist
Contact the team at STORM Guidance:
UK/Europe: +44-203-693-7480
Africa: +230-434-1277
India: 0008001004277
USA: +1-703-232-9015
Your contact details will only be used in connection with this enquiry.
Please read our Privacy Policy.


Systemic Incident Analysis: Case #1 - Salesforce
Systemic Incident Type Analysis In our attempts to take a practical approach to the potential for systemic cyber incidents, this is the...
4 min read


Interface Risk - The Overlooked Frontier in Cybersecurity
Examples of Interface Risk - Where Exposure Lives Executive Summary In today’s hyper-connected digital ecosystems, most cybersecurity...
3 min read


M&S vs Co-op Cyberattacks: What Their Responses Teach Us About Handling Breaches of
A detailed look at how M&S and Co-op responded to cyberattacks — what businesses can learn, what could have gone wrong, and what affected customers should do.
4 min read
How Cybercriminals Use Google Search to Lure Victims
Attackers are manipulating Google search to trick users into downloading malware. Learn how SEO poisoning works and how to stay protected.
3 min read
What Is Cobalt Strike and Why Attackers Use It in Cyber Attacks
Cobalt Strike is a powerful post-exploitation tool used by attackers. Learn how it works, and how to detect and defend against it.
3 min read
What Is Malvertising? How Ad-Based Malware Is Hitting Businesses
Cybercriminals are using online ads to deliver malware to businesses. Learn how malvertising works and how to defend against it.
3 min read
How Threat Actors Use Fake Software Updates to Infect Businesses
Cybercriminals are using fake browser and software updates to spread malware. Learn how these attacks work and how to protect your business.
3 min read
Living Off the Land (LOTL) Attacks: Real-World Examples and How to Detect Them
Explore real-world examples of LOTL attacks and learn practical detection tips to help your business spot stealthy cyber threats before damage is done.
3 min read
What Is Initial Access Brokering? Understanding the Cybercrime Trade
Learn how initial access brokers sell entry into business systems, the risks they pose, and how your company can defend against this growing threat.
3 min read
LinkedIn Impersonation Scams Target Executives: What You Need to Know
credential stuffing, account takeover prevention, business login attacks, cyber defence, threat intelligence, STORM Guidance, password security, identity protection, cyber attack mitigation
3 min read
How Credential Stuffing Attacks Work (And How to Defend)
credential stuffing, account takeover prevention, business login attacks, cyber defence, threat intelligence, STORM Guidance, password security, identity protection, cyber attack mitigation
3 min read
Fake Browser Updates and Drive-By Malware: The New Threats Businesses Face
Learn how fake Chrome and browser updates are tricking employees into installing malware — and how your business can defend against drive-by attacks.
3 min read
Living Off the Land (LOTL) Attacks: How Hackers Use Legitimate Tools
Learn how cybercriminals use trusted system tools to hide attacks, avoid detection, and move across networks — and how to defend your business.
3 min read
Snowflake Data Breach: What Businesses Need to Know
Learn what the Snowflake data breach means for businesses, who may be at risk, and how to protect your company from session hijacking and data theft.
3 min read
Cookie-Bite and Session Hijacking: How Cybercriminals Bypass Passwords
Learn how Cookie-Bite attacks steal browser sessions, bypass passwords, and expose businesses to BEC, cloud breaches, and ransomware.
2 min read


Controls Degradation
After a 40 year career in cyber risk management, I have had the privilege to work with a range of professionals specialising in law...
8 min read


STORM is among the first NCSC Cyber Incident Exercising Assured Service Providers
London, UK – 5 December 2023 – STORM Guidance, a leading provider of cyber incident response and cyber risk management services, today...
4 min read


The Epic Fail Behind MOVEit
The attack on MOVEit is a replay of similar breaches which expose poor data management practices. For some time now, threat actors have...
3 min read


Cyber attack methods explained, with a twist!
Learn about the ways in which cyber criminals attack businesses, using Arthurian legend analogies.
1 min read


Royal Mail Ransomware Negotiation Analysis
STORM Guidance analyse the recent ransomware negotiation between Royal Mail and LockBit. Download the full report here.
2 min read
bottom of page