Malicious Android Apps: Large-Scale Campaign Bypasses Security Measures
A large-scale malicious app campaign is bypassing Android security, leading to over 60 million downloads of harmful applications from the...
A large-scale malicious app campaign is bypassing Android security, leading to over 60 million downloads of harmful applications from the...
The digital supply chains of UK companies are notably larger and more complex compared to their global counterparts, posing significant...
Cybersecurity researchers have confirmed a critical link between BlackLock and the infamous Eldorado ransomware group, affirming that BlackLock is essentially...
Cloudflare is pioneering post-quantum cryptography (PQC) to protect online communications from future quantum threats, enhancing its Zero Trust platform's security....
Data breaches have surged by 6% year-on-year, resulting in an alarming 16.8 billion records being exposed in 2024. This increase...
A recent study by Specops uncovers prevalent passwords used in attacks on Remote Desktop Protocol (RDP), emphasizing the security risks...
Google's acquisition of Wiz for $32 billion marks a significant leap in cloud security offerings, enhancing its capabilities to support...
Newly leaked chat logs reveal a concerning connection between the BlackBasta ransomware gang and Russian governmental authorities. The recent revelations...
A recent study reveals how GenAI tools can create information-stealing malware. This research, led by Vitaly Simonovich at Cato Networks,...
In a significant move, US authorities have extradited Rostislav Panev, a dual national of Russia and Israel, on serious charges...
Fraudsters are now impersonating the Clop ransomware gang, highlighting a concerning trend in business extortion tactics. Recent findings by researchers...
In today's increasingly protectionist global landscape, cybersecurity organizations need to enhance collaboration to combat escalating threats, as emphasized by Sir...
In the ever-evolving landscape of cybersecurity, threat hunting has emerged as a pivotal practice for organizations aiming to protect their...
The UK ICO has issued an important warning regarding the handling of children's data, urging digital firms to comply with...
The ClickFix phishing scam is a sophisticated campaign targeting the hospitality industry by impersonating Booking.com. A sophisticated ClickFix phishing scam...
In Q4 2024, cybersecurity startups experienced a substantial influx of venture capital investment, marking a remarkable 35% year-on-year growth. Venture...
Tech complexity poses significant challenges for UK cybersecurity leaders, hindering their ability to secure systems effectively. The ever-increasing complexity of...
The Volt Typhoon cyber intrusion highlights critical vulnerabilities within the US electric grid, raising urgent cybersecurity concerns. A prolonged cyber...
The Medusa ransomware operation poses a significant threat to critical infrastructure, warning organizations to take proactive measures. The Cybersecurity and...
The UK cybersecurity sector has recently shown remarkable growth, with revenue increasing by 12% to surpass £13 billion, according to...
Microsoft's March Patch Tuesday brings renewed urgency for system administrators, mandating attention to over 50 vulnerabilities, including seven critical zero-days....
Concerns have emerged regarding the e-voting system for the ISACA London Chapter's upcoming Extraordinary General Meeting (EGM), set for March...
The rise of machine identities in cloud environments, now outnumbering human users, poses significant security risks. According to a recent...
Chinese hackers have targeted Juniper routers by implanting backdoor malware, prompting organizations to upgrade their devices to maintain cybersecurity. According...