A wide range of articles, videos and interviews concerning persistent and current threats that organisations face.

Threats Recursive malvertising

Researchers have uncovered more than a thousand inactive domains that, when visited, redirect the visitors to unwanted URLs as a …

Threats Mass homeworking creating new opportunities for cyber criminals

The novel coronavirus (COVID-19) and the resultant move to widespread homeworking has created new vulnerabilities for criminals to exploit, according …

Cyber attack Cybercriminals are now targeting critical electricity infrastructure

Amid the constant stream of news on the coronavirus pandemic, one event passed relatively unnoticed. On the afternoon of May …

Insider threat COVID-19 – How to keep cyber secure in a crisis

"Non tech savvy people are the biggest threat at the moment."  Jay Moloo, Corporate Information Security Officer at DB Schenker, …

Malware Viruses are common – but analysts prefer to research back-doors and droppers

Trojans, Backdoors, and Droppers top the list of most-searched malware by security analysts according to research from Kaspersky

Ransomware Building ransomware resilience: preparing for the golden hour

What businesses do the moment ransomware is detected makes a huge difference to the impact the attack can have on …

Malware Credit card skimming via Google Analytics

Web skimming is a type of cyberattack that targets online shoppers. In these attacks malicious code collects and sends data …

Third party risk The extended enterprise ecosystem: A growing threat

The benefits of a diverse, interconnected supply chain are compelling. Agility, speed, and cost reduction all weigh on the positive …

Threat intelligence Cyber threat intelligence pays dividends

Research from SANS shows that cyber threat intelligence is increasing in adoption and is proving its worth to a greater …

Insider threat Caring for data in healthcare

Email can be a point of vulnerability in many organisations, but there are techniques that can be used to help …

Third party risk The problem with secondary infection – and how this relates to island hopping

Cyber criminals are using vulnerable third parties to target organisations and remote working is making this problem worse.

Insider threat COVID-19 – What are the cyber security challenges now

Jay Moloo, Corporate Information Security Officer at DB Schenker, talks to Anna Delaney about the threats and risks of colleagues …