Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light…
Attackers are taking advantage of vulnerabilities in JetBrains Teamcity to distribute ransomware, coinminers, and backdoor payloads. Two critical vulnerabilities in…
Cybersecurity researchers have detected a new wave of phishing attacks that aim to deliver an ever-evolving information stealer referred to…
The Open Data Institute (ODI) is calling on UK political parties to adopt a number of manifesto commitments around data,…
Securing Kubernetes clusters may feel overwhelming, as it’s often challenging to prioritize security investments and focus on what matters. In…
Linux systems are used widely for servers, cloud environments, and IoT devices, which makes them an attractive target to cybercriminals,…
Digital Transformation EXPO Manchester (DTX) has announced the dates for this years exhibition, with the events doors opening on 22-…
Security researchers have uncovered a sophisticated method of exploiting the Dynamic Host Configuration Protocol (DHCP) administrators group to escalate privileges…
22 Mar Cybersecurity Knowledge: AI-Powered Output Can Only Be As Good As The Input This week in cybersecurity from the…
In light of the rise of “DDoS hacktivism” and the recent DDoS attacks aimed at disrupting French and Alabama government…
Mar 22, 2024NewsroomAmazon Web Services / Vulnerability Cybersecurity researchers have shared details of a now-patched security vulnerability in Amazon Web…
The NHS is broken. After years of chronic underfunding, the waiting list stands at more than 7.5 million, and over…











