Supply chain related security risks, and how to protect against them
We take a look at the importance of supply chain cybersecurity and share some tips to enhance it. By definition,...
Read more →We take a look at the importance of supply chain cybersecurity and share some tips to enhance it. By definition,...
Read more →It started with a password reset email in the middle of the night. Not long ago I wrote about a...
Read more →We take a look at another compromise of a mobile spyware app maker, and ask whether this action comes with...
Read more →The Qakbot botnet has suffered a major setback after its infrastructure was heavily disrupted by US and European law enforcement...
Read more →The NCSC has warned about integrating LLMs into your own services or platforms. Prompt injection and data poisoning are just...
Read more →Ohio History Connection acknowledged that in a ransomware attack the attackers may have had access to 7,600 SSNs. The Ohio...
Read more →Join our upcoming webinar and learn about weaknesses in your current endpoint security setup and how to address them. Despite...
Read more →Learn how EDR Extra Strength can help IT teams save time, money, and stop more threats. Traditional Endpoint Detection and...
Read more →We take a look at a breach notice from food delivery service PurFoods. An organisation that provides home delivery meals has...
Read more →Several researchers are seeing ransomware attacks targetting Cisco VPNs without MFA The Cisco Product Security Incident Response Team (PSIRT) has...
Read more →Becky Holmes is a big deal online. Hugh Jackman has invited her to dinner. Prince William has told her she...
Read more →The FBI repeats the warning by Barracuda that all ESG appliances should immediately be replaced because the patch was ineffective....
Read more →