The Works hit by hackers, UK retailer shuts some stores after problems with payment tills
UK high street retailer The Works has shut some of its stores following a "cyber security incident" which saw hackers gain unauthorised access to its...
Cato Networks introduces device context-driven access control to tackle remote working and BYOD risks
SASE platform provider Cato Networks has introduced a new risk-based application access control for combatting security threats and productivity challenges posed by remote working and...
Hackers Using Fake Police Data Requests against Tech Companies
Brian Krebs has a detailed post about hackers using fake police data requests to trick companies into handing over data. Virtually all major technology companies...
Cyber threats increasingly target video games – The metaverse is next
Photo by Adi Goldstein on Unsplash This blog was written by an independent guest blogger. The technical infrastructure of video games requires a significant level of access to...
Retailer The Works Closes Stores After Cyber-Attack
Suspected ransomware to blame but no card details taken Read More
Global APT Groups Use Ukraine War for Phishing Lures
Cyber-espionage campaigns make the most of big news event Read More
WhatsApp ‘Voice Message’ Is an Info-Stealing Phishing Attack
Armorblox warns of new campaign using Russian domain Read More
Real-time is where the cybersecurity risk is
I don’t know how many times I’ve heard cybersecurity professionals say something like, “Not having multi-factor authentication is a huge risk for our organization.” The...
5 ways to improve security hygiene and posture management
As management guru Peter Drucker famously said: ‘You can’t manage what you can’t measure.’ That’s certainly true when it comes to security hygiene and posture...
What is a botnet? When infected devices attack
Botnet definition A botnet is a collection of internet-connected devices that an attacker has compromised to carry out DDoS attacks and other tasks as a...