Phishing Phishing attack on Godaddy compromised Escrow.com website

This week, Godaddy.com suffered a phishing attack that enabled the phishers to view and modify customer details and change domain …

Breach Supreme Court finds Morrisons not liable for 2014 data breach

In a unanimous decision, the Supreme Court has ruled that Morrisons' employees won’t receive any compensation from the supermarket chain …

Data leak SOS Online Backup leaked personal data of 135 million users

SOS Online Backup, a company claiming to provide “multi-award winning bulletproof backup”, compromised personally-identifiable data of 135 million users by …

Podcast Feeling the stress of it all? How to look after yourself and others during...

How are we all doing? We are in the midst of the COVID-19 pandemic - many of us are in …

Podcast Feeling the stress of it all? How to look after yourself and others during...

How are we all doing? We are in the midst of the COVID-19 pandemic - many of us are in …

Cyber security ISF cyber security resources to survive the COVID-19 pandemic

Our friends at the Information Security Forum (ISF) have compiled some useful resources to keep you and your businesses secure …

Cyber risk Steps to maintain business continuity during the corona pandemic

Tim Mackey, principal security strategist at the Synopsys CyRC (Cybersecurity Research Center), says it's essential to identify areas of IT weakness before …

Cyber attack Coronavirus pandemic has unleashed a wave of cyber attacks – here’s how to protect...

While most of the world is trying to deal with the COVID-19 pandemic, it seems hackers are not on lockdown. …

Cyber security ISF cyber security resources to survive the COVID-19 pandemic

Our friends at the Information Security Forum (ISF) have compiled some useful resources to keep you and your businesses secure …

Cloud security How criminals are exploiting the cloud with multi-stage phishing attacks

Mattias Deny, VP Managed Security Services EMEA at Trustwave, outlines how attackers are using multi-stage phishing attacks targeting online cloud services. Just …

Hacking How the hackers are using Open Source Libraries to their advantage

Ben Slater, Chief Product Officer at Instaclustr, writes about how the potential of Open Source Libraries must be balanced with …

Elections Why the cyber security ratings of U.S. presidential contenders matter

Paul Gagliardi, head of threat intelligence and CISO at SecurityScorecard, investigates how secure the U.S. presidential campaigns actually are and …

Surveillance Do we – the public – have a voice in the facial recognition debate?

Stephanie Hare, Author of Technology Ethics, highlights that it's difficult to know how our data is being captured, used for …

Fake news BEWARE of fake news & fraud amidst COVID-19 outbreak

As confusion over the coronavirus continues, fake news and fraud is rife: from text messages claiming to be from an …

Risk management The risks of remote working: threats to watch out for

Andrew Tsonchev, Director of Technology at Darktrace outlines the most serious threats that security teams will face over the coming …

Vulnerability What can the Citrix bug teach us about patch management and disclosure protocols?

Oliver Pinson-Roxburgh, co-founder of Bulletproof, explains what lessons should be drawn from how CVE-2019-19781's story unfolded earlier this year, and …