Cyber warfare UK and EU impose sanctions on GRU chief in response to German parliament hack

The UK has strongly supported the European Council's decision to impose a travel ban and an asset freeze on two …

Breach Indian drugmaker Dr. Reddy’s Laboratories suffers major cyber attack

Dr. Reddy’s Laboratories Ltd, India's second-largest drugmaker, was forced to temporarily shut operations at its key plants in the US, …

Cyber crime World’s most prolific cyber criminals using criminal network to launder millions

An international investigation led by Europol and involving the UK's National Crime Agency has lifted the lid over QQAAZZ group, …

Threats NSA lists top 25 vulnerabilities routinely exploited by Chinese hackers

The U.S. National Security Agency has released a list of top 25 security vulnerabilities that Chinese hackers are actively exploiting …

Cyber attack Attacking home networks

What approaches are cybercriminals using to attack people's home networks? "You don’t have to sit in front of the house …

Cyber attack Cyber security trends over the next 2 years

How will the Cybersecurity landscape evolve over the next 2-3 years? "The attacks will be more professional, even more than …

Third party risk Assessing the visibility of supply chain risks

How can you assess the visibility of supply chain risk? “Different organisations – customers, suppliers – have different views about …

Phishing Exploiting the pandemic

How have cybercriminals exploited the pandemic for cyber attacks? "Working from home makes people significantly more vulnerable.” Professor Marco Gercke, …

Hacking How predictive threat specialists track hackers on the Dark Web

Even before the current coronavirus pandemic inflicted itself upon the world, cyberthreats were already making themselves known to businesses and …

Third party risk Business continuity and the supply chain

What is the best way to build a business continuity plan that outlines alternative suppliers? “Make sure resilience is built …

Fake news Protecting organisations from deep fakes

How are criminals using deep fake technology and how can organisations protect themselves from deep fakes? "In the past people …

Hacking How AI-powered hackers attack organisations

How are criminals using AI-powered tools to attack organisations? "Criminals are using AI like a mirror, to circumvent your security …