Cyber governance practices are maturing - and reshaping leadership expectations
30
Jul
2025

Cyber governance practices are maturing – and reshaping leadership expectations

The UK Cyber Governance Code of Practice (CGCP), published in April by the Department for Science, Innovation and Technology, is…

BeyondTrust Privilege Management for Windows Vulnerability Let Attackers Escalate Privileges
30
Jul
2025

BeyondTrust Privilege Management for Windows Vulnerability Let Attackers Escalate Privileges

A significant security vulnerability has been discovered in BeyondTrust’s Privilege Management for Windows solution, allowing local authenticated attackers to escalate…

Lazarus Group Enhances Malware with New OtterCookie Payload Delivery Technique
30
Jul
2025

Lazarus Group Enhances Malware with New OtterCookie Payload Delivery Technique

The Contagious Interview campaign conducted by the Lazarus Group continues to expand its capabilities. We have observed an exponential evolution…

Chinese Firms Linked to Silk Typhoon Filed 15+ Patents for Cyber Espionage Tools
30
Jul
2025

Chinese Firms Linked to Silk Typhoon Filed 15+ Patents for Cyber Espionage Tools

Jul 30, 2025Ravie LakshmananEndpoint Security / Cyber Espionage Chinese companies linked to the state-sponsored hacking group known as Silk Typhoon…

Lumma Password Stealer Attack Infection Chain and Its Escalation Tactics Uncovered
30
Jul
2025

Lumma Password Stealer Attack Infection Chain and Its Escalation Tactics Uncovered

The cybersecurity landscape has witnessed a significant surge in information-stealing malware, with Lumma emerging as one of the most prevalent…

WordPress Theme Security Vulnerability Enables to Execute Arbitrary Code Remotely
30
Jul
2025

WordPress Theme Security Vulnerability Enables to Execute Arbitrary Code Remotely

A critical security vulnerability has been discovered in the popular “Alone” WordPress theme that allows unauthenticated attackers to execute arbitrary…

TrickBot Behind More Than $724 Million in Crypto Theft and Extortion
30
Jul
2025

TrickBot Behind More Than $724 Million in Crypto Theft and Extortion

Cybercriminals are escalating their tactics, moving beyond traditional data encryption to employ a more aggressive approach known as quadruple extortion….

AI and machine learning engineers earn far less in UK than in US
30
Jul
2025

AI and machine learning engineers earn far less in UK than in US

US software developers specialising in artificial intelligence (AI) and machine learning (ML) engineering appear to be earning significantly more than…

CISA is facing a tight CIRCIA deadline. Here’s how Sean Plankey can attempt to meet it
30
Jul
2025

CISA is facing a tight CIRCIA deadline. Here’s how Sean Plankey can attempt to meet it

During a Senate Homeland Security and Governmental Affairs Committee hearing earlier this month in which lawmakers considered if Sean Plankey…

Global Authorities Share IoCs and TTPs of Scattered Spider Behind Major ESXi Ransomware Attacks
30
Jul
2025

Global Authorities Share IoCs and TTPs of Scattered Spider Behind Major ESXi Ransomware Attacks

Joint international advisory warns of evolving social engineering tactics and new DragonForce ransomware deployment targeting commercial facilities A collaboration of…

New Gunra Ransomware Linux Variant Launches 100 Encryption Threads with Partial Encryption Feature
30
Jul
2025

New Gunra Ransomware Linux Variant Launches 100 Encryption Threads with Partial Encryption Feature

The new Gunra group has expanded its attack surface beyond Windows PCs by releasing a Linux version of their virus,…

European Commission should rescind UK data adequacy
30
Jul
2025

GDPR’s 7th anniversary: in the AI age, privacy legislation is still relevant

It’s been slightly more than seven years since GDPR came into force – a key moment that reshaped how organisations…