threat intelligence

Phishing links becoming bigger threat than email attachments

It has long been held that a surefire way for anybody to protect themselves – and their employer – from falling victim to a cyber attack was not to download any unexpected email attachments, but according to email security specialist Mimecast, cyber criminals seem to be moving away from this tactic. In the first six…

Phishing links becoming bigger threat than email attachments Read More »

2024 seeing more CVEs than ever before, but few are weaponised

Over the first seven-and-a-half months of 2024, the number of newly-disclosed common vulnerabilities and exposures (CVEs) soared 30% year-on-year from 17,114 to 22,254, according to data published by Qualys researchers. However, out of this huge number of flaws, barely a hundredth – 204 or 0.9% – were weaponised by threat actors, said Qualys, the majority…

2024 seeing more CVEs than ever before, but few are weaponised Read More »

CrowdStrike update chaos explained: What you need to know

On Friday 19 July 2024, the UK awoke to news of a fast-spreading IT outage, seemingly global in its nature, affecting hundreds – if not thousands – of organisations. The disruption began in the early hours of Friday morning in Australia, before spreading quickly across Asia, Europe and the Americas, with the travel industry among…

CrowdStrike update chaos explained: What you need to know Read More »

Lessons from war: How Israel is fighting Iranian state-backed hacking

Hamas hacked into video streams from private security cameras in Israeli homes to gather intelligence before fighters descended on Israeli settlements near the Gaza strip on 7 October 2023, according to the Israel National Cyber Directorate (INCD). For Gaby Portnoy, director general of the INCD, the hacking was no surprise: “But it went deeper than…

Lessons from war: How Israel is fighting Iranian state-backed hacking Read More »

Chinese spies target vulnerable home office kit to run cyber attacks

The China-backed advanced persistent threat (APT) actor tracked as APT40 has been busy evolving its playbook and has recently been observed actively targeting new victims by exploiting vulnerabilities in small office and home office (SoHo) networking devices as a staging post for command and control (C2) activity during their attacks This is according to an…

Chinese spies target vulnerable home office kit to run cyber attacks Read More »

Safeguarding democracy from cyber threat peril  

With the country heading to the polls, ensuring the cyber security of the electoral infrastructure couldn’t be more crucial. The government has warned that rising geopolitical tensions across the globe have the potential to impact elections as at least 64 countries gear up to head to the polls, representing 49% of the world’s population. Beyond…

Safeguarding democracy from cyber threat peril   Read More »

Security in the public cloud explained: A guide for IT and security admins

Who is responsible for security in the public cloud? This is a question businesses need to consider as they increasingly deploy more workloads and use cloud-based IT infrastructure, platform services and applications. In Gartner’s How to make integrated IaaS and PaaS more secure than your own data center report, analysts discuss the benefits of adopting…

Security in the public cloud explained: A guide for IT and security admins Read More »

Kaspersky says it can continue to sell cyber threat intelligence in spite of US ban

The US Department of Commerce’s Bureau of Industry and Security (BIS) has banned Kaspersky Lab from directly or indirectly providing antivirus software and cyber security products or services, meaning Kaspersky will be prohibited from conducting or participating in certain information and communication technology service transactions in the US. “The Russian Government has proven that it…

Kaspersky says it can continue to sell cyber threat intelligence in spite of US ban Read More »

Security Think Tank: The cloud just got more complicated

The cloud recently became more complicated and more important than ever; but I’ll leave the best bit to the end. One of the main security concerns with using the cloud, although I accept that there are several, are misconfigurations. These lead to data breaches or, in the case of hacktivism, misconfigurations allow for denial-of-service attacks.…

Security Think Tank: The cloud just got more complicated Read More »

Europol sting operation smokes multiple botnets

Some of the most prominent malware-dropping botnets in operation today, including Bumblebee, IcedID, Pikabot, Smokeloader, SystemBC and Trickbot, have been disrupted in a coordinated law enforcement action orchestrated through the European Union’s (EU’s) Europol agency. Operation Endgame, which enlisted the support of both the UK’s National Crime Agency (NCA) and the US’s FBI, as well…

Europol sting operation smokes multiple botnets Read More »

Shopping Cart
Scroll to Top