Cyber Security Redefined

Whether it’s protecting your organisation from phishing attempts or other data breaches, or demonstrating compliance with heightened regulatory requirements, CyberWhite delivers the security controls and expertise you need to run a continuous, comprehensive cyber security program.
About Us Security Check

Why Partner with CyberWhite?

24 hours a day and seven days a week, we support clients irrespective of sector, size, or location.

We deliver information security advisory services, risk mitigation strategies and technical solutions to protect information within organisations.

We deliver innovative services, tailored to suit specific organisational requirements and risk profiles. We then map these against the appetite to address identified risks, providing a fully managed support network to ensure successful a project outcome.

Learn More

engie logo Insolvency logo ROC logo winn group logo bernicia logo Choice-Logo Clear Links logo concern-group-logo curo logo edinburgh uni logo enerSys logo exi logo harwood capital logo hays travel logo insolvency service logo kromek logo logo-university-of-manchester McGinley-Support-Services-Logo mental health concern logo ncfe logo NEL-logo NHS England Logo nhs-logo North Tyneside Council Logo px-group logo Raven Property Logo RWS Logo south tyneside council logo University of Sunderland Logo the distance logo thorntons logo Turning Point Logo tai wales & west housing winn-solicitors-logo

Our Latest Resources

Here we discuss everything from cyber security news and knowledge updates to the latest technology and events.

HPE patches critical StoreOnce backup flaw

HPE rushes out patch for critical StoreOnce backup flaw Hewlett Packard Enterprise has issued patches for eight vulnerabilities in its StoreOnce backup and deduplication appliances. The worst, CVE-2025-37093 (CVSS 9.8), lets remote attackers bypass authentication on any version prior to StoreOnce 4.3.11. Zero Day Initiative says the flaw sits in the machineAccountCheck method. Once inside, […]

Read More

Google unmasks vishing gang targeting Salesforce

Google unmasks ‘UNC6040’ vishing gang targeting Salesforce users Google’s Threat Intelligence Group (GTIG) has unmasked UNC6040, a financially-driven gang that runs English-language voice-phishing (vishing) campaigns. Posing as IT support staff, callers persuade employees to install or approve a doctored version of Salesforce’s Data Loader. Once authorised, the tool siphons corporate Salesforce data, after which the […]

Read More

Cisco rushes to fix critical ISE bug

Cisco rushes to fix critical ISE bug that shares passwords across cloud deployments Cisco has patched a critical static-credential flaw (CVE-2025-20286, CVSS 9.9) in its Identity Services Engine (ISE) cloud images for AWS, Azure and Oracle Cloud. Because ISE generates the same default credentials for every deployment running the same software release on a given […]

Read More

Chrome Extensions Leaking Your Data

Chrome Extensions Are Leaking Your Data – and the Keys to the Kingdom Symantec researchers found that dozens of popular Chrome extensions—some with hundreds of thousands of installs—send telemetry over unencrypted HTTP and even hard-code API keys (Google Analytics, Azure, AWS, Tenor, crypto services) directly in their JavaScript. Examples include SEMRush Rank, Browsec VPN, MSN […]

Read More

MS helps India break up AI-driven tech-support scam

Microsoft helps India break up AI-driven tech-support scam On 6 June 2025 India’s Central Bureau of Investigation (CBI), working with Microsoft and Japan’s National Police Agency, raided 19 sites in Delhi, Haryana and Uttar Pradesh (Operation Chakra V). Six suspects were arrested and two illegal call-centres shut down. The syndicate posed as Microsoft support, targeting […]

Read More

Gen-AI at Work

Gen-AI at Work: Why Banning ChatGPT Won’t Save Your Data The Hacker News article explains why simply blocking public generative-AI tools is a poor defence against data loss. Zscaler’s ThreatLabz team saw AI/ML traffic jump 36-fold in 2024 and counted more than 800 different AI apps inside enterprises. When companies ban ChatGPT-style services, employees often […]

Read More

Database Dump Exposes 184 Million Logins

Security researcher Jeremiah Fowler uncovered an unsecured ElasticSearch database holding 184 million login records—usernames and plain-text passwords for services such as Apple, Google, Facebook, Microsoft and many more. A spot-check of 10,000 entries revealed hundreds of government email addresses from at least 29 countries, including the UK and the US, raising national-security concerns. The trove, […]

Read More

Ransomware hits West Lothian schools

Interlock, a ransomware gang, breached the education network of Scotland’s West Lothian Council. The council first said no data had been taken, but after Interlock dumped files online it admitted that “a small percentage” of data was stolen. Personal information on teachers, parents and carers—including scanned passports and driving licences—has appeared on the criminals’ leaks […]

Read More

Hackers are ringing your office

Authorities have issued an alert to law firms about Luna Moth (also known as Silent Ransom Group, Chatty Spider and Storm-0252), an extortion gang that has been running sophisticated “callback phishing” attacks since 2022. Victims first receive innocuous emails—often about fake invoices or subscription renewals—asking them to telephone a customer-service number. Once on the call, […]

Read More

Two decades of penetration testing

I’ve been elbow-deep in other people’s networks for nineteen years now, and if there’s one constant it’s that the shiny toys always turn up long before the basics are nailed down. The EDR / MDR / XDR mirage Over the last half-decade every board slide has the same checkbox: “SOC in place – ✅”. They […]

Read More

hackers league table of EDR tools

The Conti ransomware group published an “EDR Tier List” on X (formerly Twitter), grading well-known Endpoint Detection and Response tools from S Tier (hardest to evade) down to “LOL” Tier (trivial to bypass). A surprise entry in the bottom tier is Microsoft Defender for Endpoint (MDE), which the gang says is easy to sidestep in […]

Read More

Oracle Cloud Credential Leak

CISA Issues Warning Over Oracle Cloud Credential Leak The US Cybersecurity and Infrastructure Security Agency (CISA) has warned organisations that a January breach of two obsolete Oracle Cloud servers may expose millions of credentials. • Oracle privately told customers that its core Oracle Cloud Infrastructure (OCI) was not compromised, but attackers accessed usernames from legacy […]

Read More

ASUS Routers Critical Security Flaw

ASUS Routers Hit by Critical AiCloud Security Flaw ASUS has disclosed CVE-2025-2492, a critical authentication-bypass flaw (CVSS 9.2) affecting multiple router models that run the AiCloud remote-access feature. A crafted request lets remote attackers execute functions without logging in. ASUS has released patched firmware in the 382, 386, 388 and 102 branches and urges owners […]

Read More

Phishing Kit That Sidesteps Office 365 MFA

SessionShark: The Phishing Kit That Sidesteps Office 365 MFA Security researchers at SlashNext have uncovered “SessionShark,” a new phishing kit for hire that steals Microsoft Office 365 session tokens and lets criminals bypass multi-factor authentication (MFA). Sold on underground markets, SessionShark spins up convincing fake Office 365 login pages. When a victim enters their credentials, […]

Read More

159 Vulnerabilities Exploited in the Wild

Q1 2025: 159 Vulnerabilities Exploited in the Wild – Is Your Firm Still Behind on Patching? Threat-intelligence analysts have counted 159 distinct CVEs actively exploited in the wild during Q1 2025—a 28 percent rise on the same period last year. Nearly half of the in-use flaws date from 2023 or earlier, confirming that organisations still […]

Read More

Small Vulnerabilities Trigger Big Breaches

How Small Vulnerabilities Trigger Big Breaches – Five Lessons from the Front Line A research team from Intruder dissected five real-world security incidents to show how seemingly “low-risk” flaws can snowball into full-scale breaches: 1. SSRF → AWS credential theft – an application followed a 302 redirect to the EC2 metadata service, leaking cloud keys. […]

Read More

Phishers Use Real-Time Checks to Outsmart Security

Phishers Use Real-Time Checks to Outsmart Security Measures According to the report, cybercriminals have begun using real-time checks within phishing campaigns to determine whether a victim’s system or browser is under active security inspection. By performing quick, automated lookups in the moment a user clicks a malicious link, attackers can decide whether to serve genuine […]

Read More

Fortinet Attackers Staying Hidden Despite Patches

Fortinet Cautions Users: Attackers Staying Hidden in Networks Despite Patches Fortinet has issued a warning that cybercriminals continue to lurk in networks even after organisations have patched known vulnerabilities in Fortinet products. Attackers who exploited older flaws have managed to maintain persistence by using compromised credentials, backdoor accounts, or hidden footholds. Although many organisations patched […]

Read More

PipeMagic Trojan Exploits Windows CLFS

PipeMagic Trojan Exploits Windows CLFS for Stealth Attacks A newly identified PipeMagic trojan exploits the Common Log File System (CLFS) in Windows to launch sophisticated attacks. Security researchers observed the malware injecting itself into system processes using a previously undocumented technique related to Windows’ CLFS driver. This stealthy approach helps bypass many endpoint defences, allowing […]

Read More

Cybercriminals exploiting WordPress MU plugins

WordPress Sites Under Threat from Stealthy MU Plugins Cybercriminals are exploiting WordPress MU plugins (commonly known as “must-use” plugins) to maintain persistent access to WordPress sites. By disguising their backdoors or malicious scripts as MU plugins, attackers can evade standard plugin checks and remain undetected. These sneaky plugins load automatically whenever WordPress runs, making it […]

Read More

Our Services

As a Cyber Security specialist, we have a complete suite of industry leading solutions including;

CSS – CyberWhite Support Service

The CyberWhite Support Service (CSS) offers you a cost-effective way of increasing your security knowledge base without the need to invest in additional staff.
Find out More

Penetration Testing

Our experts will help you understand how effective your cyber security strategy is in four key areas via penetration, network, cloud and application testing.
Find out More

Cyber Essentials – CE/CE Plus

Cyber Essentials is a Government-backed scheme, led by the National Cyber Security Centre (NCSC), to help organisations protect themselves against common online threats.
Find out More

What Our Clients Say

“CyberWhite have been a pleasure to deal with by repeatedly demonstrating their professionalism and technical knowledge throughout the procurement process and execution of our project. From initially exploring our goals to a consultant working with us on-site and remotely, we’ve enjoyed a positive experience that has ultimately benefited our organisation and helped to improve our Cyber Security posture.”

Read More
Head of Network and Infrastructure

View our video Testimonial from Clear Links by Gerard Norris, Central Operations Manager

Gerard Norris, Central Operations Manager

View our video Testimonial from Hays Travel by Ken Campling, Group Finance Director

Ken Campling, Group Finance Director

“I would like to say a thousand “thank you’s” to CyberWhite after rescuing us from the commercial disaster we faced after being subjected to a very sophisticated fraud. Without the timely involvement and expertise from CyberWhite, we would undoubtedly have faced catastrophic consequences including a significant financial loss and possibly a forced closure of the business. We will always remember the kindness and professional approach taken by the CyberWhite team. They were able to successfully recover the critical data which was the life blood of our business. This expertise has allowed us to continue trading and provided us with the additional benefits of ensuring that we are more cyber risk aware and we now have a security partner to support us.”

Read More
Jon Moore, Director

Our video Testimonial from Mental Health Concern (NHS) by Lawrence Thompson, Head of IT

Lawrence Thompson, Head of IT

“As an Operator of Essential Services, PX Group comply with advice provided by recognised security bodies such as NCSC. The advice is relevant to all organisations who provide infrastructure or support to the UK’s critical national infrastructure. PX Group engaged CyberWhite to undertake Third Party Security Audits (aligned to ISO28000:2007) against key suppliers who had access to information assets within the PX Group domain. CyberWhite created a comprehensive audit document set and supported this with interviews and visits in order to validate responses. The output from CyberWhite was comprehensive and provided security assurance to PX Groups stakeholders and interested parties that the key suppliers had a focus on security and understood and could demonstrate best practices in relation to the handling of PX Groups information assets. This process has been invaluable in validating what we believed and providing a platform from which we will continue to assess, review and benchmark all parties in our information supply chain.”

Read More
Lee Farrow, ICT Network & Security Specialist

Do you know how secure your systems are?

Please use the form below to contact our experts about our cyber security health check service.

We have a wide range of industry leading cyber security tools at our disposal. But first we will identify any vulnerabilities, specify our recommended solutions, then help you prioritise an effective schedule to greatly reduce your cyber risk exposure.

    CyberWhite Phone

    Meet the CyberWhite Team

    CyberWhite News

    CyberWhite team, events and community news
    15 April 2025

    Malware Takes Aim at Healthcare Industry

    ResolverRat Malware Takes Aim at Healthcare Industry A malicious campaign using ResolverRat malware has been targeting healthcare providers globally, taking advantage of open RDP connections and phishing scams. The malware provides remote access to compromised systems, enabling attackers to exfiltrate medical data and potentially disrupt patient services. Security researchers warn that ResolverRat’s operators appear to […]

    Read More
    7 August 2023

    CyberWhite’s Path to Net Zero

    At CyberWhite, we are determined to achieve net-zero carbon emissions by 2030. The video below showcases our efforts to reduce our carbon footprint significantly: Embracing Renewable Energy: We aim to minimise reliance on fossil fuels by investing in solar power. Green Transportation Solutions: Shifting to electric vehicles and encouraging remote work to cut down commuting […]

    Read More
    20 June 2023

    David Horn speaks on recent data breach at top UK organisations

    At the end of May, 8 of the biggest organisations in the UK were hit with a cyber-attack exposing thousands of employees’ bank and personal data through their payroll system. So far only 3 of the companies have been named in the data breach: British Airways, Boots, and the BBC, with no official confirmation on […]

    Read More
    2 May 2023

    Partnership with Vianet Group PLC

    CyberWhite Ltd announces partnerships with Vianet Group PLC and px Group for 3-year agreement’s to provide cyber security advice and support. David Horn and Matthew Hewison of CyberWhite met with px’s Mark Willis and Vianet’s Thom Menzies, to discuss how working closely together over the coming months and years will not only benefit businesses in […]

    Read More
    25 May 2022

    CyberWhite Open New HQ

    CyberWhite are pleased to annouce the opening of their new HQ in Sunderland.

    Read More
    20 August 2021

    Meet the neighbours – Northern Spire Ltd

    We were delighted this week to appear in Wear Business as they ran a featured article Northern Spire ltd, welcoming CyberWhite as business neighbours in Defender Court. Northern Spire specialise in providing a wide range of financial services and operate as a senior partner practice of St James’s Place Wealth Management. CyberWhite’s relationship with Northern […]

    Read More
    5 August 2021

    CEO Sleepout – Fundraising Total

    CEO SLEEPOUT – FUNDRAISING UPDATE You may remember earlier in the year that our Director, Matt Hewison took part in the CEO Sleepout event in Middlesbrough city centre. We can now inform you that the event raised a phenomenal c£21,800.00!!! Over 40 people bedded down at Middlesbrough Town Hall in the pouring rain, to raise […]

    Read More
    25 July 2021

    Weekly Round Up 19th – 23rd July

    Welcome CyberWhite followers to our latest week in review.  We’d like to first of all thank all of our current and new followers. It means a great deal to us that our security advice is able to reach you. It would be fantastic if you could lend us a helping hand simply by liking our […]

    Read More
    8 July 2021

    New Middlesbrough office for cyber security firm

    Middlesbrough Mayor, Andy Preston with CyberWhite directors Matt Hewison and David Horn CyberWhite, an established provider of cyber security and cyber risk mitigation solutions for business, has opened a new office in Middlesbrough’s Boho Zone. The technology solutions provider is proud to be at the centre of a number of key local developments for the […]

    Read More
    24 May 2021

    CyberWhite’s Week in Review – 17 May to 21 May

    We’d like to take a moment of your time and share with you what CyberWhite have been up to during the last week in case you’ve missed any of our activities. Please click the button below to download our week in review.  We hope you enjoy it.  Any questions, please get in touch. Click here […]

    Read More
    18 May 2021

    Businesses urge local authorities to take action

    A group of North East businesses has written to the newly elected police and crime commissioner for Cleveland to call on him to put tackling fraud at the heart of his agenda as increasing numbers of people and businesses are targeted. Active Chartered Financial Planners, a Stockton-based finance specialist, Cyberwhite, a cyber security specialist with […]

    Read More
    4 March 2021

    Budget 2021

    We’re sure you’ve all been keeping up to date with the 2021 Budget unveiled by Chancellor Rishi Sunak in the House of Commons.  As we look ahead to life on the other side of the pandemic, the Chancellor released several initiatives that look to have a hugely positive impact on the North East, and in particular, the Tees valley region. As a growing business […]

    Read More
    11 August 2020

    CyberWhite Newsletter Summer 2020

    Summer is officially here and so is our much anticipated Summer 2020 Newsletter This edition contains a fantastic interview with industry veteran Bruce Hockin, Channel Sales Director from Arcserve plus interviews with our very own Jemma Cavana-Cole and Charlotte Topping. You can also find out more about what we’ve been up to during lockdown including […]

    Read More
    4 August 2020

    Finalist in the ‘Small Business of the Year’

    We are delighted to announce that CyberWhite Ltd has been named as a finalist in the ‘Small Business of the Year’ category in the upcoming UK Social Mobility Awards. CyberWhite Ltd is committed to making a difference and we are incredibly humbled to have our efforts recognised in these flagship awards.

    Read More
    4 August 2020

    CyberWhite Sponsors Young Teesside Cricketers

    CyberWhite, a cybersecurity firm based in Seaham, is sponsoring Saltburn Cricket Club Under 13s following a disturbed start to the season due to COVID 19. Matt Hewison, chief operating officer of the firm, has been coach and manager of the team for the past two seasons, and wanted to increase his support of the club […]

    Read More