State of DevOps: Success happens through platform engineering
25
Jan
2023

State of DevOps: Success happens through platform engineering

The latest Global 2023 state of DevOps report from Puppet by Perforce has found that IT professionals whose organisations adopt…

Specops Honeypot report
25
Jan
2023

Lessons Learned from the Windows Remote Desktop Honeypot Report

Threat actors spend much of their time on surveillance. Typical services generate many audit logs that may be hard to…

iOS Zero-Day
25
Jan
2023

Apple Fixes Actively Exploited iOS Zero-Day on iPhones, iPads

In an effort to ensure the safety and security of its customers, Apple has taken the necessary steps to address…

Bitwarden responds to encryption design flaw criticism
25
Jan
2023

Bitwarden responds to encryption design flaw criticism

Password vault vendor accused of making a hash of encryption Password vault vendor Bitwarden has responded to renewed criticism of…

Threat actors launch one malicious attack every minute
25
Jan
2023

Threat actors launch one malicious attack every minute

BlackBerry’s inaugural Quarterly Threat Intelligence Report highlights the volume and model of treats across a range of organisations and regions,…

Browser Security Checklist
25
Jan
2023

The Definitive Browser Security Checklist

Security stakeholders have come to realize that the prominent role the browser has in the modern corporate environment requires a…

Arnold Clark cyber attack claimed by Play ransomware gang
25
Jan
2023

Arnold Clark cyber attack claimed by Play ransomware gang

Glasgow-based Arnold Clark – one of the UK’s largest car dealer networks, which made a billionaire out of its founder…

The benefits of video conferencing with iMind
25
Jan
2023

The benefits of video conferencing with iMind

What is video conferencing? It’s a mode of communication which allows you to conduct meetings with all participants in different…

China spies on the UK populace with microchips
25
Jan
2023

China spies on the UK populace with microchips

Britain populace should start being cautious with smart appliances as security analysts suggest that china might have started a spying…

Riot Games breached: How did it happen?
25
Jan
2023

Riot Games breached: How did it happen?

The hackers who breached Riot Games last week are asking for $10 million not to leak the stolen source code…

Credential Harvesting
25
Jan
2023

North Korean Hackers Turn to Credential Harvesting in Latest Wave of Cyberattacks

Jan 25, 2023Ravie LakshmananCryptocurrency / Malware A North Korean nation-state group notorious for crypto heists has been attributed to a…

Boards struggle to resolve cyber risk in digital supply chains
25
Jan
2023

Boards struggle to resolve cyber risk in digital supply chains

The accelerated digitisation of supply chains poses a greater degree of risk than ever before, and while three-quarters of organisations…