What’s Needed for Secure by Design Success We spent years understanding the culprits of why “shift-left” controls fail to identify…
Microsoft has reminded Windows administrators that driver synchronization in Windows Server Update Services (WSUS) will be deprecated on April 18,…
J-magic malware campaign targets Juniper routers Pierluigi Paganini January 24, 2025 Threat actors are targeting Juniper routers with a custom…
Facing the Reality: Cybersecurity’s Mounting Pressures The cybersecurity landscape is evolving at an unprecedented pace. This past year, breaches resulting…
The United States Department of Justice (DoJ) has announced the indictment of five men – two North Koreans, a Mexican…
A North Korean threat group has been using a technique called RID hijacking that tricks Windows into treating a low-privileged account…
US prosecutors charged five, including North Koreans, for tricking firms into hiring fake IT workers, sending $866K+ to fund weapons…
MPs and peers have launched an inquiry into the UK’s ability to protect undersea internet cables that link the country…
Security researchers have discovered an arbitrary account takeover flaw in Subaru’s Starlink service that could let attackers track, control, and hijack vehicles in…
The Texas Attorney General’s Office has started an investigation into how Ford, Hyundai, Toyota, and Fiat Chrysler collect, share, and…
A plan to build a £3.75bn hyperscale datacentre on a plot of green belt land neighbouring the South Mimms Service…
A threat actor targeted low-skilled hackers, known as “script kiddies,” with a fake malware builder that secretly infected them with…











