Breach Gunnebo data breach: Blueprints of bank vaults, security systems leaked online

A cyber attack that struck Swedish security company Gunnebo in August led to the exposure of 38,000 internal documents containing …

Data privacy ICO puts Experian on notice for multiple data privacy failings

The Information Commissioner's Office has asked credit rating agency Experian to make a number of changes to the way it …

Breach Hackers steal personal data of Google employees after breaching US law firm

Fragomen, Del Rey, Bernsen & Loewy LLP, a law firm that offers employment verification compliance services to Google in the …

Breach Hackers auctioning 1TB of Nitro PDF documents and user data online

A group of cyber criminals is reportedly auctioning a massive repository of 1TB worth of documents that it claims to …

Cyber attack Attacking home networks

What approaches are cybercriminals using to attack people's home networks? "You don’t have to sit in front of the house …

Cyber attack Cyber security trends over the next 2 years

How will the Cybersecurity landscape evolve over the next 2-3 years? "The attacks will be more professional, even more than …

Third party risk Assessing the visibility of supply chain risks

How can you assess the visibility of supply chain risk? “Different organisations – customers, suppliers – have different views about …

Phishing Exploiting the pandemic

How have cybercriminals exploited the pandemic for cyber attacks? "Working from home makes people significantly more vulnerable.” Professor Marco Gercke, …

Hacking How predictive threat specialists track hackers on the Dark Web

Even before the current coronavirus pandemic inflicted itself upon the world, cyberthreats were already making themselves known to businesses and …

Third party risk Business continuity and the supply chain

What is the best way to build a business continuity plan that outlines alternative suppliers? “Make sure resilience is built …

Fake news Protecting organisations from deep fakes

How are criminals using deep fake technology and how can organisations protect themselves from deep fakes? "In the past people …

Hacking How AI-powered hackers attack organisations

How are criminals using AI-powered tools to attack organisations? "Criminals are using AI like a mirror, to circumvent your security …