CISA Releases Six ICS Advisories Details Security Issues
24
Jan
2025

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS) advisories addressing vulnerabilities in a range…

Review of legal rule on computer evidence long overdue, say Post Office scandal victims
24
Jan
2025

Review of legal rule on computer evidence long overdue, say Post Office scandal victims

Nearly 1,000 people were wrongly convicted of crimes based on flawed evidence from a computer system used in Post Offices,…

North Korean IT Workers Demands Ransomware By Stealing Companies Source Codes 
24
Jan
2025

North Korean IT Workers Demands Ransomware By Stealing Companies Source Codes 

North Korean IT workers masquerading as remote workers have been breaking into Western companies, stealing confidential source codes, and requesting…

Beware of Fake Captcha Verifications Spreading Lumma Malware
24
Jan
2025

Beware of Fake Captcha Verifications Spreading Lumma Malware

In January, Netskope Threat Labs uncovered a sophisticated global malware campaign leveraging fake CAPTCHA pages to deliver the Lumma Stealer…

SaaS Backup and Recovery
24
Jan
2025

2025 State of SaaS Backup and Recovery Report

The modern workplace has undergone a seismic transformation over recent years, with hybrid work becoming the norm and businesses rapidly…

Teachers to use AI for lesson planning and marking
24
Jan
2025

Teachers to use AI for lesson planning and marking

Using artificial intelligence (AI) for marking and lesson planning will give teachers more time with students, according to the UK’s…

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor
24
Jan
2025

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed “J-magic” has been discovered targeting enterprise-grade Juniper routers with a backdoor attack that leverages a…

Jane Devry
24
Jan
2025

Apono’s 2024 Achievements Set the Stage for Innovative Cloud Access Management in 2025

Apono, a leading provider of privileged access solutions for the cloud, announced key achievements from 2024 alongside its strategic plans…

North Korean IT Worker Scheme
24
Jan
2025

DoJ Indicts 5 Individuals for $866K North Korean IT Worker Scheme Violations

The U.S. Department of Justice (DoJ) on Thursday indicted two North Korean nationals, a Mexican national, and two of its…

CISOs boost board presence by 77% over two years
24
Jan
2025

CISOs boost board presence by 77% over two years

In a global study of the goals, priorities and strategies of chief information security officers (CISOs), security analytics and observability…

24
Jan
2025

Adapting fraud prevention for the hybrid working world

Remote and hybrid working models have become the norm for many since the COVID-19 pandemic. One US study found that…

SonicWall warns of a critical CVE-2025-23006 zero-day likely exploited in the wild
24
Jan
2025

SonicWall warns of a critical CVE-2025-23006 zero-day likely exploited in the wild

SonicWall warns of a critical CVE-2025-23006 zero-day likely exploited in the wild Pierluigi Paganini January 24, 2025 SonicWall warns customers…