News

  • Cabinet Office Reports 800 Missing Electronic Devices in Three Years

    PRIVACY PRIVACY The figures have raised concerns about sensitive government data falling into hands of nefarious actors Read More

    Read More

  • How DNS filtering can help protect your business from Cybersecurity threats

    PRIVACY PRIVACY This blog was written by an independent guest blogger. The Domain Name System (DNS) is an important tool that connects devices and services together across the Internet. Managing your DNS is essential to your IT cybersecurity infrastructure. When poorly managed, DNS can become a huge landscape for attackers. Nonetheless, when properly configured, DNS…

    Read More

  • US Car Giant General Motors Hit by Cyber-Attack Exposing Car Owners’ Personal Info

    PRIVACY PRIVACY The stuffing attack exposed customer information and allowed hackers to redeem rewards points Read More

    Read More

  • ICO Fines Clearview AI £7.5m for Collecting UK Citizens’ Data

    PRIVACY PRIVACY Clearview AI has also ordered to delete existing data of UK residents from its systems Read More

    Read More

  • 7 machine identity management best practices

    PRIVACY PRIVACY Machine identities are a large, and fast-growing part of the enterprise attack surface. The number of machines—servers, devices, and services—is growing rapidly and efforts to secure them often fall short. Cybercriminals and other threat actors have been quick to take advantage. Cyberattacks that involved the misuse of machine identities increased by 1,600% over…

    Read More

  • How To Make Your SOC Identity-Aware and Efficient

    PRIVACY PRIVACY While an attacker only needs to be right once, security teams must be right every time. That’s why SOC teams must stop ransomware attackers from exploiting AD weaknesses. Operating in shifts around the clock, Security Operations Center teams strive to prevent, detect and respond to cybersecurity threats and incidents. But in an evolving…

    Read More

  • Mark Zuckerberg Sued Over Cambridge Analytica Data Breach

    PRIVACY PRIVACY An investigation found Zuckerberg had lax oversight of users and created misleading privacy agreements Read More

    Read More

  • UK’s Most Innovative Cyber SME 2022 Finalists Announced

    PRIVACY PRIVACY DCMS announce 14 finalists of the UK’s Most Innovative Cyber SME Competition Read More

    Read More

  • A Practical Approach for Shifting Left

    PRIVACY PRIVACY A practical approach to understanding shift left security and how shifting security left can help teams achieve DevSecOps success.  As a critical part of DevSecOps, shifting left has become a key aspect of the modern software development process. Traditionally, security was applied at the end of the software development lifecycle (the right side)…

    Read More

  • Forging Australian Driver’s Licenses

    PRIVACY PRIVACY The New South Wales digital driver’s license has multiple implementation flaws that allow for easy forgeries. This file is encrypted using AES-256-CBC encryption combined with Base64 encoding. A 4-digit application PIN (which gets set during the initial onboarding when a user first instals the application) is the encryption password used to protect or…

    Read More

News, Advisories and much more

Exit mobile version