MDR Services

Our Managed Detection and Response Services provide continuous monitoring from a team who’ll neutralise any breaches at speed...

Incident Response Services

Gain access to malware experts to quickly contain threats and reduce future exposure to attacks...

Gartner Recognised

Integrity360 has been recognised as a Gartner Representative Vendor.

Download our MDR ebook

Many organisations are turning to managed service providers and MDR services. Find out why in our ebook.

The Reality of Ransomware: What you need to know in 2024

In 2024, the landscape of ransomware attacks will continue to evolve, drawing from past trends while adapting to new defences and technologies. 

How should organisations respond to a data breach?

In this blog we look at how an organisation should respond to a data breach.

Your guide to 2025: Trends and Predictions

Stay ahead of the latest cyber security industry developments, advancements and threats, and understand how you can best protect your organisation.

Choosing your cyber security framework

Learn about seven of the most popular cyber security frameworks being used by businesses around the world.

MDR Services

Our Managed Detection and Response Services provide continuous monitoring from a team who’ll neutralise any breaches at speed

Integrity360 Accelerates Global Expansion

As part of its global expansion plan Integrity360 has acquired Grove Group, headquartered in Cape Town, South Africa.

Integrity360 Expands into France

As part of its global expansion plan Integrity360 has acquired Holiseum

Integrity360 Accelerates Global Expansion

As part of its global expansion plan Integrity360 has acquired Grove Group, headquartered in Cape Town, South Africa.
Integrity360 Emergency Incident Response button Under Attack?

Insights

OT security

Top 6 OT security weaknesses and how to reduce the risk

Operational Technology (OT) environments are vital to industries like manufacturing, energy, utilities, and transportation, to name but a few. Indeed most organisations have some degree of OT infrastructure in place. But as these systems become increasingly interconnected with IT networks, they’ve also become a growing target for cybercriminals. A single breach can bring production lines to a standstill, impact economies, compromise safety, and inflict long-lasting reputational and financial damage. 

Read More
ransomware

The first 24 hours after a ransomware attack – what should you do?

A ransomware attack is a nightmare scenario for any organisation. It’s disruptive, costly, and often deeply damaging to your reputation. How you respond in the first 24 hours can make all the difference between containment and catastrophe. In those critical moments, fast and informed action is essential. Not just to mitigate harm, but to enable recovery and identify root causes.

Read More
cybersecurity incident response plan

What does a good cyber security Incident Response plan look like?

It doesn't matter how large your organisation is, you are at risk and sooner or later cyber criminals will try to attack you. It’s not a matter of whether your organisation will face a security incident but when. That's why a robust incident response plan is crucial. So what elements should your incident response plan include to be truly effective?

Read More
MDR checklist

What to look for in an MDR service: a checklist for decision-makers

With the increasing sophistication of cyber threats, businesses need more than just security tools—they need expert-driven, proactive defence. Managed Detection and Response (MDR) services provide this, but not all MDR solutions are created equal. Choosing the right provider can mean the difference between efficient threat detection and response or drowning in alert noise and ineffective security measures. 

Read More
world password day

World password day 2025: same story, new year

Here we are again—another World Password Day, and still the most commonly used password is 123456. It’s 2025, and that sequence remains the digital equivalent of leaving your front door wide open with a neon “come on in” sign above it.

Read More
PAM

7 reasons why Privileged Access Management (PAM) should be your frontline defence against insider threats

We hear a lot about external threats but in reality, one of the biggest risks to your organisation might already be on the inside. Insider threatswhether malicious, negligent, or compromisedpose a significant threat to organisations. And with privileged accounts often at the centre of these threats, Privileged Access Management (PAM) has become an essential part of any modern cyber defence strategy. 

Read More
Cyberfire MDR

From noise to clarity the top 6 cyber challenges CyberFire MDR tackles

CyberFire MDR, Integrity360’s advanced Managed Detection and Response service, is purpose-built to address the real and persistent challenges facing modern businesses. Powered by our proprietary CyberFire platform and backed by 24/7 global SOC coverage, it delivers low-noise, high-accuracy protection where it matters most.

Read More
threat advisory

Threat Advisory: Critical 10.0 vulnerability in Erlang OTP SSH Implementation

A critical vulnerability in Erlang's Open Telecom Platform (OTP) SSH implementation has recently been published. OTP is a collection of middleware, libraries and tools written in the Erlang programming language and is used by a large number of global companies for communications. According to https://erlang-companies.org, companies that may be affected include Ericsson, T-Mobile, BT and Bet365 (that reportedly use it in it's live betting infrastructure) and major products that may be affected include WhatsApp, Klarna and Discord. 

 

The vulnerability has the highest severity possible with a CVSS score of 10 out of 10. This is likely because it may allow an attacker to perform unauthenticated remote code execution on a target server. The attack complexity has been described at low, meaning exploitation is likely trivial. Any network facing server with the Erlang OTP implementation of SSH enabled that isn't version OTP-27.3.3, OTP-26.2.5.11 or OTP-25.3.2.20 should be considered vulnerable. The current recommendation is to either update to these versions, or disabling the SSH server or access to it temporarily until it's patched. 

 

If you are currently or have been vulnerable to this exploitation, please feel free to reach out to Integrity360 for more advice. We are monitoring the situation and will provide more updates as they arise.

Read More
threat advisory

Threat Advisory: Mitre's CVE Contract Renewed Last Minute

Foundational security organisation MITRE announced on the 15th April that the funding it received to maintain the CVE and CWE program would not be renewed. This was important, because MITRE, along with NIST and the CISA, are a huge contributor to the CVE program.
 
The announcement came abruptly, with the funding organisation DHS declining to comment on the reason at this time, however they provided the following statement:
 
"Although CISA's contract with the MITRE Corporation will lapse after April 16th, we are urgently working to mitigate impact and to maintain CVE services on which global stakeholders rely."
 
This meant that after 16th April 2025, the CVE database, which is critical for tracking and understanding vulnerabilities, might experience disruption. This meant that vulnerabilities discovered after this time would not likely be tracked and published until a resolution is found (this is not thought to affect CVE records dating before the 16th).
 
All cybersecurity tools and processes rely on the CVE database to track and respond to newly discovered vulnerabilities across the environment. A disruption in this service, even temporary, would have affected the visibility of emerging threats and delayed the publication of official CVE records. This, in turn, could have impacted the accuracy of vulnerability scans, the speed of detection, and the prioritisation of response actions.
 
Integrity360 learned that on the morning (EST) of the 16th, the U.S. Government had (at the last minute) extended it's funding for the program, buying more time for a more long-term approach to be agreed.
 
Integrity360 is monitoring the situation and will provide more updates as they arise.
 
Below is the original MITRE letter that was circulated on the 15th April, explaining the halting of the service.

Read More