What Are Computer Worms?
In today's interconnected digital world, businesses are constantly under threat from cybercriminals seeking to exploit vulnerabilities in systems, networks, and devices. One of the most...
The Ongoing Evolution of the CIS Critical Security Controls
For decades, enterprises around the world have used the CIS Critical Security Controls to grow their cyber defenses. Learn how they continue to evolve. Read...
Darknet Services Fuel Holiday Scams and E-Commerce Exploits
Cybercriminals are ramping up scams via darknet marketplaces, selling phishing kits for $100-$1000 Read More
Aggressive Chinese APT Group Targets Governments with New Backdoors
A Trend Micro analysis of Earth Estries found that the Chinese threat actor is using new backdoors to avoid detection during espionage operations Read More
Starbucks and Grocery Stores Face Disruption after Ransomware Attack on Blue Yonder
Supply chain management provider Blue Yonder confirmed it was hit by ransomware attack Read More
What Graykey Can and Can’t Unlock
This is from 404 Media: The Graykey, a phone unlocking and forensics tool that is used by law enforcement around the world, is only able...
Over a Third of Firms Struggling With Shadow AI
Some 35% of global organizations report challenges monitoring use of non-approved AI tools Read More
UK Scam Losses Surge 50% Annually to £11.4bn
Cifas figures reveal scammers stole over £11bn from UK consumers in the past 12 months Read More
FlipaClip animation app data breach exposes details of almost 900,000 users
Flipaclip, an animation creation app that is particularly popular with youngsters, has exposed the details of over 890,000 users. Read more in my article on...
New York Secures $11.3m from Insurance Firms in Data Breach Settlement
New York State has agreed a $11.3m settlement from two insurance firms following the breach of the personal data of over 120,000 drivers in the...