It’s no surprise to me that financial services organisations missed the 17 January2025 deadline to be in compliance with the…
The Australian Human Rights Commission (AHRC) disclosed a data breach incident where private documents leaked online and were indexed by…
Malware doesn’t need fancy tools to be dangerous. Sometimes, all it takes is WMIC, a quiet, native utility that’s still…
The North Korean state-sponsored threat actor TA406, also tracked as Opal Sleet and Konni, has set its sights on Ukrainian…
Google has introduced Device Trust from Android Enterprise, a new solution for making sure that private Android devices used for…
The European Union Agency for Cybersecurity (Enisa) has debuted a European Union Vulnerability Database (EUVD) to provide “aggregated, reliable and…
British food retailer Co-op Group said Wednesday it has reached the recovery phase following a major cyberattack and is restoring…
A cybersecurity incident on Nucor Corporation’s systems, the largest steel producer in the U.S., forced the company to take offline parts of its…
Adobe has released a critical security update for its popular design software Illustrator, addressing a severe vulnerability that could allow…
A recent discovery by FortiGuard Labs has unveiled a cunning phishing campaign orchestrated by threat actors deploying Horabot malware, predominantly…
For years, Distributed Denial of Service (DDoS) attacks have been one of the most common and disruptive tactics used by…
Eight years ago, Simon Whittaker, head of cyber security at Belfast-based consultancy Instil, narrowly avoided having his front door smashed…











