
The Small Business
Cyber Security Guy
Welcome to my blog and podcast, where I share brutally honest views, sharp opinions, and lived experience from four decades in the technology trenches. Whether you're here to read or tune in, expect no corporate fluff and no pulled punches.
Everything here is personal. These are my thoughts, not those of my employer, clients, or any poor soul professionally tied to me. If you’re offended, take it up with me, not them.
What you’ll get here (and on the podcast):
Straight-talking advice for small businesses that want to stay secure
Honest takes on cybersecurity trends, IT malpractice, and vendor nonsense
The occasional rant — and yes, the occasional expletive
War stories from the frontlines (names changed to protect the spectacularly guilty)
I've been doing this for over 40 years. I’ve seen genius, idiocy, and everything in between. Some of it makes headlines, and most of it should.
This blog and the podcast is where I unpack it all. Pull up a chair.

The 4chan Hack: When the Internet's Toilet Got Flooded – And What That Means for Your Business
In April 2025, 4chan – the internet’s digital back alley – got thoroughly rinsed. A full-scale hack exposed moderators, leaked source code, and proved even the web’s most chaotic platforms aren’t immune to catastrophic failure. But here’s the twist: the real story isn’t the leak, it’s what it reveals about your own business.
If outdated software, poor access control, or silence-in-a-crisis sounds familiar, you’re already on thin ice. This isn’t just drama for meme lords – it’s a neon-lit warning for UK SMBs. Find out what happened, who did it, and how not to be next.

Marks & Spencer Cyberattack: Why Your Click & Collect Order is Missing and Your Contactless Card is Crying
Percy Pig and Colin the Caterpillar Have Been Taken Hostage – And Yes, This Is Real Life
Marks & Spencer has confirmed it’s the latest victim of a cyberattack, but forget dull technical jargon — the internet’s gone wild over rumours that iconic treats Percy Pig and Colin the Caterpillar are caught in the digital crossfire.
With contactless payments down and click-and-collect orders delayed, shoppers have been left confused, furious, and Colin-less.
Was it ransomware? A supply chain hit? Or just a catastrophic IT whoopsie? We’ve dug into the timeline, the fallout, and the very British drama that is a cake and a pig caught in cyber limbo.

Samsung Galaxy S24 Security Disaster: How a Built-In App Left Millions at Risk
The Samsung Galaxy S24 was meant to be the crown jewel of Android. Instead, it shipped with a gaping security hole—thanks to a preinstalled app no one asked for. Researchers found that this app allowed remote attackers to hijack your device, steal your data, and generally wreck your digital life. This isn’t just sloppy—it’s a disgrace.
Samsung pushed out a flagship phone with built-in vulnerabilities, proving once again that shiny hardware means nothing if the software is a ticking time bomb. If you own a Galaxy S24, you should be furious. If you don’t—maybe keep it that way.

Rent-a-Malware: Hackers Now Offering Full macOS Control for Hire
People used to think Macs couldn’t get viruses. That’s no longer true. New malware kits called JokRAT and XenoRAT can give hackers full control of a Mac computer. These tools are easy to rent online, even for people with no tech skills.
Hackers can use them to spy on you, steal files, and stay hidden on your computer. Mac users should use security software, update their systems often, and be careful about what they click on.
If your Mac is part of a company network, a single infected device can put the whole business at risk. Stay alert and stay protected.

Patch Me If You Can: Firewall Vendors Ranked by How Much They Care About Your Security
Not all firewalls are created equal—some vendors make patching painless, others seem to actively hide the fixes. We evaluated SonicWall, Fortinet, UniFi, DrayTek, Zyxel, WatchGuard, Sophos, Meraki and more using a realistic UK small business setup: one firewall, one switch, two access points.
Then we scored them out of 50 on cost, usability, licensing, and update handling.
Spoiler: UniFi smashed it. SonicWall? Not so much. If you want to know which vendor respects your time and budget—and which one just wants your wallet—this is your no-nonsense firewall buyer’s guide.

Over 4,000 WordPress Sites Hacked – All Thanks to Yet Another Plugin Flaw
More than 4,000 WordPress websites have been hacked thanks to a critical vulnerability in the WP-Automatic plugin.
The flaw (CVE-2024-27956) allows unauthenticated attackers to inject malicious code, redirect users, and install backdoors—all without logging in.
Despite a patch being available, thousands of sites remain vulnerable due to poor update practices and weak plugin hygiene.
This isn't just another WordPress scare story—it's a glaring example of why unmanaged, unmonitored websites are a security liability.
If you’re still treating your website like a digital brochure from 2010, it’s time to wake up before Google blocks you altogether.

Oracle’s Legacy Patching Fiasco: A Masterclass in How Not to Handle a Breach
Oracle just got hacked—badly—and their excuse? “It was just a legacy system.” That’s corporate-speak for we left the door wide open for four years and hoped no one would notice. Millions of records stolen, a $20 million ransom, and Oracle’s response was to shrug and point at the old kit.
If you’re running ancient servers and thinking it won’t happen to us, think again. This isn’t just Oracle’s disaster—it’s a wake-up call for every UK business still clinging to outdated tech. Want to know how a four-year-old bug turned into a PR nightmare? You’ll want to read this.

They Slid Into Your DMs: How Hackers Are Weaponising Microsoft Teams to Breach Your Business
Hackers are now using Microsoft Teams chats to phish credentials and drop malware — right under your nose. By exploiting Teams' external access features and mimicking trusted domains, attackers send convincing messages that look like they’re from colleagues or suppliers.
Users, assuming Teams is safe, often click without thinking. These attacks bypass traditional email defences and thrive on default settings and user trust. While Microsoft offers tools to mitigate the risk, most organisations haven’t configured them.
If you’re treating Teams like a walled garden, it’s time for a reality check — your next breach might start with a Teams ping.

Still Using Windows Server 2012? You Might As Well Leave the Door Wide Open
Still running Windows Server 2012 in 2025? You might as well leave your doors unlocked and shout “come on in” to attackers. End of life means no patches, no protection, and no excuse. This article explains why sticking with outdated infrastructure is a reckless liability, not a cost-saving strategy. From cyber insurance exclusions to ICO scrutiny and NCSC guidance, we break down the real-world risks UK businesses face.
You’ve been warned: unsupported systems aren’t just old — they’re dangerous. If your IT provider says otherwise, it’s time for a new one. This is your wake-up call.Still running Windows Server 2012 in 2025? You might as well leave your doors unlocked and shout “come on in” to attackers. End of life means no patches, no protection, and no excuse. This article explains why sticking with outdated infrastructure is a reckless liability, not a cost-saving strategy.
From cyber insurance exclusions to ICO scrutiny and NCSC guidance, we break down the real-world risks UK businesses face. You’ve been warned: unsupported systems aren’t just old — they’re dangerous. If your IT provider says otherwise, it’s time for a new one. This is your wake-up call.

Your Supplier Got Hacked! Now What? A Step-by-Step Guide for UK SMBs
When your supplier suffers a cyber attack, it’s not just their mess to clean up — it can quickly become your problem too. This guide walks UK SMBs through exactly what to do if a supplier breach threatens your data, operations, or reputation.
From securing your systems and understanding GDPR obligations, to involving the right experts and tightening up contracts, you’ll learn how to stay one step ahead when the blast radius includes you.
Because in today's interconnected world, your security is only as strong as the weakest link in your supply chain — literally.

Google Chrome Hit by Critical ‘Use After Free’ Flaw: CVE-2025-3066 Explained
Google has patched a critical "Use After Free" vulnerability in Chrome, tracked as CVE-2025-3066, which could allow remote code execution via malicious web pages. The flaw was found in Chrome's Site Isolation feature—meant to protect users—ironically making it a prime attack vector.
Users on versions prior to 135.0.7049.84/.85 (Windows/Mac) or 135.0.7049.84 (Linux) are urged to update immediately. Left unpatched, this bug could let attackers install malware, steal data, or worse.
This is yet another reminder that browser updates aren’t optional—they’re essential. Don’t be the low-hanging fruit. Check your version and patch now.

The Bigger They Are, the Harder You Fall
They had the infrastructure. They had the trust. And they had the gall to cover up the very breach they caused. This isn’t fiction—it’s a real-world cybersecurity disaster involving a big-name MSP, a firewall misconfiguration, and a damning internal email that said “don’t tell the customer.”
Weeks later, the logs were useless, the excuses piled up, and the recovery bill is heading for six figures. If you think your MSP would never… think again. Here’s what went wrong, how it got exposed, and why a Cyber Essentials check could’ve stopped the whole mess cold.

Your Suppliers Are a Massive Cyber Risk (And You're Probably Letting Them In the Front Door)
Think your cyber security is airtight? Doesn’t matter — your suppliers might be the ones getting you hacked. One dodgy vendor, one reused password, and suddenly your business is in the headlines for all the wrong reasons.
Supply chain attacks are exploding, and most businesses have no idea who actually has access to their systems. If you’re blindly trusting every outsourced service, freelancer, or cloud tool without asking hard questions, you’re basically inviting cybercriminals in for tea.
Want to know how bad it really is — and what you should be doing right now? Read this before it’s too late.

Windows 11’s April Update Quietly Installs Web Server Folder – Because Why the F*** Not?
Microsoft’s April 2025 Windows 11 update (KB5036893) has pulled a fast one, quietly creating a C:\inetpub folder on machines that have never had IIS installed. No changelog entry.
No heads-up. Just a mysterious web server directory suddenly appearing across the fleet. Whether you’re managing personal laptops or enterprise desktops, this isn’t just clutter—it’s a potential security red flag.
IT pros are furious, forums are lighting up, and Microsoft? Silent. Again. If you thought updates couldn’t get worse, think again.
Here’s why this bizarre move should have every sysadmin on high alert and reaching for the patch rollback button.

How to Stay Safe Online if You're at High Risk: NCSC's New Surveillance Guidance Explained
The internet isn’t a safe space for everyone — especially if you’re a journalist, activist, or survivor of abuse. The UK’s National Cyber Security Centre (NCSC) has released new guidance for people and communities at high risk of digital surveillance. And unlike most government advice, this is actually worth reading.
It’s direct, useful, and designed for the real world — covering everything from encrypted messaging to avoiding spyware.
Whether you're at risk or supporting someone who is, this guide offers clear, practical steps to help you stay safer online when the consequences of being tracked could be life-altering.

April 2025 Patch Tuesday: What You Need to Know
Act now or risk breach: Microsoft’s April 2025 Patch Tuesday just dropped with 121 fixes—and one is already being actively exploited in the wild. From remote desktop gateways to Office and authentication systems, these vulnerabilities target everything you rely on.
Think your network is safe? Think again. With privilege escalation bugs, Hyper-V escapes, and Kerberos enforcement changes, this update isn’t optional—it’s urgent.
Don’t let today’s Patch Tuesday become tomorrow’s security incident. Whether you’re an IT lead or managing critical systems, this one demands immediate attention. Read the full breakdown, patch fast, and stay one step ahead of Exploit Wednesday.

Snap, Crackle, Compromise: How Kellogg's Quietly Served Up Employee Data to Hackers
Think your breakfast is safe? Think again. WK Kellogg Co.—yes, the cereal giant—just had employee data spilled thanks to a third-party software breach. Hackers from the Clop ransomware gang waltzed in via Cleo’s "secure" file transfer platform and helped themselves to names, addresses, and Social Security numbers.
It’s another textbook example of supply chain negligence dressed up as digital transformation.
If your business relies on vendors without grilling their security, you might as well start pouring milk on your firewall and calling it breakfast. Here's how it happened—and why it should scare the cereal out of you.

Breach of the Month Club: March 2025 Edition
Welcome to the inaugural edition of Breach of the Month Club™, your monthly tour of reputational disaster.
March 2025 was a banner month for avoidable breaches, from Lloyds accidentally mailing out million-pound statements, to Jaguar Land Rover getting wrecked by leaked JIRA credentials.
Reform UK ignored GDPR completely, Morrisons got battered by a supplier breach, and 23andMe? Well, they lost your DNA and filed for bankruptcy.
We break it all down with just the right amount of sarcasm—and a reminder that no company is too big to fail at basic cyber hygiene.

Unprecedented Surge: Nearly 24,000 IPs Target PAN-OS GlobalProtect Gateways in Coordinated Attack
Nearly 24,000 IP addresses just launched a coordinated scan on Palo Alto Networks’ GlobalProtect gateways — and if you think this was random, think again. This wasn’t a glitch in the matrix or some bored script kiddie.
It was targeted, global, and likely the opening move in something far bigger. If you’re running PAN-OS at the edge of your network and haven’t patched recently, you’re on the menu.
This article breaks down what happened, what it means, and what you need to do right now before your firewall turns into a front door. Spoiler: hope is not a security strategy.

Apple’s 3 Zero-Days: If You Haven’t Updated Yet, What Are You Even Doing With Your Life?
Apple has dropped emergency updates to fix three zero-day vulnerabilities—and yes, they’re already being exploited.
These flaws affect iPhones, iPads, Macs, and more, letting attackers bypass USB protections, escape Safari’s sandbox, and escalate privileges through CoreMedia.
If you’re not updating your devices right now, you’re basically rolling out the red carpet for hackers. This isn’t just another patch Tuesday. It’s a loud, flashing red warning. Your move.
⚠️ Full Disclaimer
This is my personal blog. The views, opinions, and content shared here are mine and mine alone. They do not reflect or represent the views, beliefs, or policies of:
My employer
Any current or past clients, suppliers, or partners
Any other organisation I’m affiliated with in any capacity
Nothing here should be taken as formal advice — legal, technical, financial, or otherwise. If you’re making decisions for your business, always seek professional advice tailored to your situation.
Where I mention products, services, or companies, that’s based purely on my own experience and opinions — I’m not being paid to promote anything. If that ever changes, I’ll make it clear.
In short: This is my personal space to share my personal views. No one else is responsible for what’s written here — so if you have a problem with something, take it up with me, not my employer.