Remote working Security for the “new normal”

In the wake of COVID-19, businesses turned to quick-fix, yet unreliable, security solutions to mobilise remote working at speed. Now, …

Breach Hacker hijacks 23k misconfigured MongoDB databases; threatens to leak data

A hacker has uploaded ransom notes on as many as 22,900 misconfigured MongoDB databases after wiping their content, thereby forcing …

Malware Viruses are common – but analysts prefer to research back-doors and droppers

Trojans, Backdoors, and Droppers top the list of most-searched malware by security analysts according to research from Kaspersky

Threats You’ve Got Mail(ware)! New FakeSpy malware targeting Royal Mail users

An upgraded version of FakeSpy, a three-year-old information-stealing malware, is masquerading as legitimate postal service apps, including the Royal Mail …

Cyber skills COVID-19 – How will the pandemic affect the cyber recruitment industry

"A client of ours has asked to only see candidates with their own laptops".  Ian Donnelly, Principal Consultant (Cyber Security) at …

Threat intelligence Cyber threat intelligence pays dividends

Research from SANS shows that cyber threat intelligence is increasing in adoption and is proving its worth to a greater …

Third party risk The problem with secondary infection – and how this relates to island hopping

Cyber criminals are using vulnerable third parties to target organisations and remote working is making this problem worse.

Insider threat COVID-19 – What are the cyber security challenges now

Jay Moloo, Corporate Information Security Officer at DB Schenker, talks to Anna Delaney about the threats and risks of colleagues …

Malware Viruses are common – but analysts prefer to research back-doors and droppers

Trojans, Backdoors, and Droppers top the list of most-searched malware by security analysts according to research from Kaspersky

Ransomware Building ransomware resilience: preparing for the golden hour

What businesses do the moment ransomware is detected makes a huge difference to the impact the attack can have on …

Malware Credit card skimming via Google Analytics

Web skimming is a type of cyberattack that targets online shoppers. In these attacks malicious code collects and sends data …

Third party risk The extended enterprise ecosystem: A growing threat

The benefits of a diverse, interconnected supply chain are compelling. Agility, speed, and cost reduction all weigh on the positive …

Threat intelligence Cyber threat intelligence pays dividends

Research from SANS shows that cyber threat intelligence is increasing in adoption and is proving its worth to a greater …

Insider threat Caring for data in healthcare

Email can be a point of vulnerability in many organisations, but there are techniques that can be used to help …

Third party risk The problem with secondary infection – and how this relates to island hopping

Cyber criminals are using vulnerable third parties to target organisations and remote working is making this problem worse.

Insider threat COVID-19 – What are the cyber security challenges now

Jay Moloo, Corporate Information Security Officer at DB Schenker, talks to Anna Delaney about the threats and risks of colleagues …