It's time to get to grips with DORA
14
May
2025

It’s time to get to grips with DORA

It’s no surprise to me that financial services organisations missed the 17 January2025 deadline to be in compliance with the…

Australian Human Rights Commission leaks docs to search engines
14
May
2025

Australian Human Rights Commission leaks docs to search engines

The Australian Human Rights Commission (AHRC) disclosed a data breach incident where private documents leaked online and were indexed by…

Top 5 WMIC Commands Used By Malware 
14
May
2025

Top 5 WMIC Commands Used By Malware 

Malware doesn’t need fancy tools to be dangerous. Sometimes, all it takes is WMIC, a quiet, native utility that’s still…

TA406 Hackers Target Government Entities to Steal Login Credentials
14
May
2025

TA406 Hackers Target Government Entities to Steal Login Credentials

The North Korean state-sponsored threat actor TA406, also tracked as Opal Sleet and Konni, has set its sights on Ukrainian…

Google strengthens secure enterprise access from BYOD Android devices
14
May
2025

Google strengthens secure enterprise access from BYOD Android devices

Google has introduced Device Trust from Android Enterprise, a new solution for making sure that private Android devices used for…

Enisa launches European vulnerability database
14
May
2025

Enisa launches European vulnerability database

The European Union Agency for Cybersecurity (Enisa) has debuted a European Union Vulnerability Database (EUVD) to provide “aggregated, reliable and…

UK retailer Co-op restoring systems following major cyberattack
14
May
2025

UK retailer Co-op restoring systems following major cyberattack

British food retailer Co-op Group said Wednesday it has reached the recovery phase following a major cyberattack and is restoring…

Steel giant Nucor Corporation facing disruptions after cyberattack
14
May
2025

Steel giant Nucor Corporation facing disruptions after cyberattack

A cybersecurity incident on Nucor Corporation’s systems, the largest steel producer in the U.S., forced the company to take offline parts of its…

Critical Adobe Illustrator Vulnerability Let Attackers Execute Malicious Code
14
May
2025

Critical Adobe Illustrator Vulnerability Let Attackers Execute Malicious Code

Adobe has released a critical security update for its popular design software Illustrator, addressing a severe vulnerability that could allow…

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware
14
May
2025

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware

A recent discovery by FortiGuard Labs has unveiled a cunning phishing campaign orchestrated by threat actors deploying Horabot malware, predominantly…

Naveen Goud
14
May
2025

The Evolving Nature of DDoS Attacks: A Smokescreen for More Dangerous Threats

For years, Distributed Denial of Service (DDoS) attacks have been one of the most common and disruptive tactics used by…

Why we must reform the Computer Misuse Act: A cyber pro speaks out
14
May
2025

Why we must reform the Computer Misuse Act: A cyber pro speaks out

Eight years ago, Simon Whittaker, head of cyber security at Belfast-based consultancy Instil, narrowly avoided having his front door smashed…