This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. To find out more about the cookies we use, see our Privacy policy and Cookie Policy.

Choices about cookies

You can choose which analytical, functionality and targeting cookies we can set by clicking on the button(s):

You can also choose to "Reject All" non-essential cookies by clicking the button below. However, if you use your browser settings to block all cookies (including essential cookies) you may not be able to access all or parts of our website.
Except for essential cookies, all cookies will expire after 12 months.
If you have any questions or concerns about our use of cookies, please send us an email at info@dynarisk.com.


June Newsletter

Welcome To Our June Newsletter

Get ready for the latest update! Discover the most recent news from the team.

MOVEit Zero-Day Vulnerability: The Latest Updates & DynaRisk Press Coverage

Warnings have been issued regarding a critical security threat found in the MOVEit file transfer software. This vulnerability poses a significant risk to organisations, allowing attackers to steal valuable data. It's important to ensure that you and your business are keeping up with the latest developments - you can read our CEO, Andrew's post on the vulnerability.

Following recent attacks resulting from this vulnerability, DynaRisk was featured in the Insurance Post. Andrew was contacted for a feature of his analysis and thoughts on the threat so far: Read more

New Client Announcements:

We're excited to welcome Cloud10 Technology Consulting! Cloud10 is a Managed Service Provider and is using our risk-monitoring solution, Breach Check, to support and protect its clients. We're excited to be working with other clients in this area, along with TekRisk, as we aim to grow in the Managed Services Provider Market.

We've also recently welcomed Intruder, a proactive security monitoring platform which is used to detect and offer remediation advice on vulnerabilities. Intruder is leveraging our Leaked Data API to scan their clients for compromised data records.

Contact us to find out more about our Leaked Data API

Identification & Selfies: Circulating On The Dark Web

In the ever-evolving cybercrime landscape, a disturbing trend has emerged that targets individuals' identification photos used for account verification. Cybercriminals are now distributing these photos, where a person is holding their ID document, on the dark web. In this blog post, we’ll quickly explore the details, along with what individuals need to do to help protect themselves. 

Read our latest blog post to find out more

Our New Resource Centre

As we continue to grow, we recognised the need for a central location to share valuable content with our clients. That's why we created the Resource Centre!

Our Resource Centre will allow you to explore and download infographics, case studies, and analysis. We're constantly adding new content, so stay tuned! If you have any suggestions on content that you or your customers would find useful, please email us: sales@dynarisk.com

Have You Activated Your Breach Check Free Trial?

Don't miss out on our newly launched Breach Check free trial.

We recently launched our Cyber Risk Monitoring platform and want to prove to our customers the power of this software. You can try it out for yourself with a 2-week trial that includes 20 comprehensive cyber scans.

Click here to get started.