threat intelligence

The Data Bill: It’s time to cyber up

In the latest deliberations on the Data Use and Access Bill in the House of Lords, I set out two amendments to offer well overdue updating to the Computer Misuse Act (CMA) of 1990. In preparing for committee stage of the bill I remain incredibly grateful to everyone involved with the CyberUp campaign, their analysis…

The Data Bill: It’s time to cyber up Read More »

Latest attempt to override UK’s outdated hacking law stalls

Two amendments to the Data (Access and Use) Bill that would have established a statutory legal defence for security professionals and ethical hackers to protect them from prosecution under the 1990 Computer Misuse Act (CMA) have failed to make it beyond a House of Lords committee hearing after being withdrawn. The 34-year-old CMA broadly defines…

Latest attempt to override UK’s outdated hacking law stalls Read More »

LockBit ransomware gang teases February 2025 return

Despite being taken down and humiliated by the National Crime Agency (NCA) coordinated Operation Cronos in February 2024, an unknown individual(s) associated with, or claiming to represent, the LockBit ransomware gang has broken cover to announce the impending release of a new locker malware, LockBit 4.0. In screengrabs taken from the dark web that have…

LockBit ransomware gang teases February 2025 return Read More »

Phishing links becoming bigger threat than email attachments

It has long been held that a surefire way for anybody to protect themselves – and their employer – from falling victim to a cyber attack was not to download any unexpected email attachments, but according to email security specialist Mimecast, cyber criminals seem to be moving away from this tactic. In the first six…

Phishing links becoming bigger threat than email attachments Read More »

2024 seeing more CVEs than ever before, but few are weaponised

Over the first seven-and-a-half months of 2024, the number of newly-disclosed common vulnerabilities and exposures (CVEs) soared 30% year-on-year from 17,114 to 22,254, according to data published by Qualys researchers. However, out of this huge number of flaws, barely a hundredth – 204 or 0.9% – were weaponised by threat actors, said Qualys, the majority…

2024 seeing more CVEs than ever before, but few are weaponised Read More »

CrowdStrike update chaos explained: What you need to know

On Friday 19 July 2024, the UK awoke to news of a fast-spreading IT outage, seemingly global in its nature, affecting hundreds – if not thousands – of organisations. The disruption began in the early hours of Friday morning in Australia, before spreading quickly across Asia, Europe and the Americas, with the travel industry among…

CrowdStrike update chaos explained: What you need to know Read More »

Lessons from war: How Israel is fighting Iranian state-backed hacking

Hamas hacked into video streams from private security cameras in Israeli homes to gather intelligence before fighters descended on Israeli settlements near the Gaza strip on 7 October 2023, according to the Israel National Cyber Directorate (INCD). For Gaby Portnoy, director general of the INCD, the hacking was no surprise: “But it went deeper than…

Lessons from war: How Israel is fighting Iranian state-backed hacking Read More »

Chinese spies target vulnerable home office kit to run cyber attacks

The China-backed advanced persistent threat (APT) actor tracked as APT40 has been busy evolving its playbook and has recently been observed actively targeting new victims by exploiting vulnerabilities in small office and home office (SoHo) networking devices as a staging post for command and control (C2) activity during their attacks This is according to an…

Chinese spies target vulnerable home office kit to run cyber attacks Read More »

Safeguarding democracy from cyber threat peril  

With the country heading to the polls, ensuring the cyber security of the electoral infrastructure couldn’t be more crucial. The government has warned that rising geopolitical tensions across the globe have the potential to impact elections as at least 64 countries gear up to head to the polls, representing 49% of the world’s population. Beyond…

Safeguarding democracy from cyber threat peril   Read More »

Security in the public cloud explained: A guide for IT and security admins

Who is responsible for security in the public cloud? This is a question businesses need to consider as they increasingly deploy more workloads and use cloud-based IT infrastructure, platform services and applications. In Gartner’s How to make integrated IaaS and PaaS more secure than your own data center report, analysts discuss the benefits of adopting…

Security in the public cloud explained: A guide for IT and security admins Read More »

Shopping Cart
Scroll to Top