The threat actors behind the Hive ransomware-as-a-service (RaaS) scheme have launched attacks against over 1,300...
An ongoing supply chain attack has been leveraging malicious Python packages to distribute malware called...
We speak to Anna Brailsford, CEO of Code First Girls, about her path into the...
A China-based financially motivated group is leveraging the trust associated with popular international brands to...
Business impact analyses (BIAs) have been traditionally used for business continuity and disaster recovery (BC/DR)...
NIST has published Special Publication (SP) 800-215, Guide to a Secure Enterprise Network Landscape. Access...
A Ukrainian national who has been wanted by the U.S for over a decade has...
On average, organizations report using 102 business-critical SaaS applications, enabling operations of most departments across an organization,...
Multiple security vulnerabilities have been disclosed in F5 BIG-IP and BIG-IQ devices that, if successfully...
Iranian government-sponsored threat actors have been blamed for compromising a U.S. federal agency by taking...
Hackers tied to the North Korean government have been observed using an updated version of...
Making sure you minimise your cloud provider’s access to your data....
Hundreds of databases on Amazon Relational Database Service (Amazon RDS) are exposing personal identifiable information...
According to a recent survey, 90% of CISOs running teams in small to medium-sized enterprises (SMEs)...
NIST has released a major revision to Special Publication (SP) 800-160 Volume 1, Engineering Trustworthy...
Cybersecurity researchers have unearthed new samples of malware called RapperBot that are being used to...
Internet behemoth Google on Tuesday said it plans to roll out Privacy Sandbox for Android...
1 Comment
We speak to Charlene Hunter, CEO of Coding Black Females, about how she got into...
The FISSEA Forums are quarterly meetings to provide opportunities for policy and programmatic updates, the...
Spotify’s Backstage has been discovered as vulnerable to a severe security flaw that could be...
Credit: Marina Minkin A novel attack method has been disclosed against a crucial piece of technology...
Cybersecurity researchers have disclosed details of now-patched flaws in Zendesk Explore that could have been...
Today, most Network Detection and Response (NDR) solutions rely on traffic mirroring and Deep Packet...
NIST has published NIST Internal Report (IR) 8409, Measuring the Common Vulnerability Scoring System Base...
NIST has released the third public draft of NIST Special Publication (SP) 800-188, De-Identifying Government...
A suspected Chinese state-sponsored actor breached a digital certificate authority as well as government and...
Why sanitisation is necessary, the risks to manage, and how to sanitise affordably....
Internet giant Google has agreed to pay a record $391.5 million to settle with 40...
The AFP has identified those responsible for the Medibank hack...
Entities located in East and Southeast Asia as well as Ukraine have been targeted at...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.