In a significant blow to data security, the Police Service of Northern Ireland (PSNI) has fallen victim to a major data breach this week, resulting in the exposure of sensitive information to both officers and citizens, raising concerns about the…
Category: IT SECURITY GURU
Lookout incorporates generative AI to support security professionals and boost security
Lookout, the endpoint-to-cloud security company, today announced the launch of Lookout SAIL, the Company’s new generative artificial intelligence (gen AI) assistant that will reshape the way cybersecurity professionals interact with Lookout Mobile Endpoint Security and Lookout Cloud Security solutions and…
Lookout incorporates generative AI assistant to support security professionals and boost security
Lookout, the endpoint-to-cloud security company, today announced the launch of Lookout SAIL, the Company’s new generative artificial intelligence (gen AI) assistant that will reshape the way cybersecurity professionals interact with Lookout Mobile Endpoint Security and Lookout Cloud Security solutions and…
KnowBe4 helps protect endangered species to celebrate 13th anniversary
KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, has celebrated its 13th anniversary by donating to protect 13 endangered species and adopt 13 beehives. The company says it continuously seeks opportunities to care for…
DTX Europe 2023
DTX brings together creative minds, technical experts and the latest tools needed to drive change and generate value across today’s organisations. “Your Home of Digital Transformation” Covering cloud, networks and infrastructure; data, analytics and AI; software engineering and DevOps; and…
Understanding Changes in the OWASP API Security Top 10 List
The Open Web Application Security Project (OWASP), a non-profit foundation devoted to web application security, recently released the 2023 OWASP API Security Top 10 list. The list aims to raise awareness about the most common API security risks plaguing organisations…
History’s Greatest Insider Threats
One of the most difficult problems for security professionals to grapple with is defending against dangers that come from within an organisation. Unfortunately, protecting against insider threats is often more complicated than traditional threat prevention. There are many different ways…
Cyber-attack hits the UK’s electoral registers
Confidence in the UK’s electoral authority has been cast into doubt following the revelation of a malicious cyber-attack that infiltrated the records of 40 million voters, remaining undetected for a year. Shockingly, this breach was not disclosed to the public…
Synopsys Bolsters Application Security Testing Solutions Through Collaborations with NowSecure and Secure Code Warrior
Yesterday, Synopsys unveiled two new collaborative agreements, solidifying partnerships with respected experts in mobile security and privacy, NowSecure, as well as Secure Code Warrior, a leading provider of an agile learning platform focused on developer-driven security. These collaborations are set…
91% of IT leaders better protected with PAM but want more affordable solutions
Keeper Security released findings from its Privileged Access Management Survey: Deployment Amid Economic Uncertainty. The report explores global insights from IT and security executives, revealing that while IT leaders consider PAM solutions critical to their security stack, cost constraints and complex…
The industry’s most insightful minds come together at Digital Transformation EXPO Europe (DTX)
As 2023’s advancements in technology pose more questions than answers, the industry’s most insightful minds come together at Digital Transformation EXPO Europe (DTX) – the home of digital transformation – and UC EXPO (UCX) – the home of customer and…
Evolution of Enterprise IT and AI: DTX + UCX Europe 2023 prepares teams for new realm
As 2023’s advancements in technology pose more questions than answers, the industry’s most insightful minds come together at Digital Transformation EXPO Europe (DTX) – the home of digital transformation – and UC EXPO (UCX) – the home of customer and…
Data Protection and Digital Information Bill – what are the changes?
Everyday I’m immersed in the challenges faced by organisations and individuals navigating the complex world of Data Protection. Recently, this has been compounded by the developments surrounding the Data Protection and Digital Information Bill, after the government released a keeling…
techUK and Axiologik join forces to present the UK Tech Plan at major political party conferences
Leading technology trade association, techUK, is set to take centre stage at major political party conferences in September and October, where they will discuss the UK Tech Plan. With invaluable support from digital delivery consultancy Axiologik – who recently co-hosted…
Digital skills gap is challenging the cyber security of UK businesses
Nearly half of CISOs (48%) say that the skills shortage in their teams or organisations is the biggest people-related challenge their business is facing this year, closely followed by a lack of applicants for vacancies (36%). That’s according to new…
Economic uncertainty leaves over 1 mil UK SMEs at brink of collapse
Over the past couple of years, the cost of living in the UK has increased significantly. The annual rate of inflation reached 11.1% in October 2022, which was the highest we’ve experienced for 41 years. Consequently, small to medium sized…
Ransomware on manufacturing industry caused $46bn in losses
Between 2018 and 2023, 478 manufacturing companies have suffered a ransomware attack, leading to a loss of approximately $46.2 billion in downtime alone. Serious cyber incidents affecting manufacturing companies can lead to significant disruptions to production lines. As a result,…
Keeper empowers cybersecurity advocates with new Influencer Programme
Keeper Security has announced the launch of its groundbreaking Keeper Influencer Program. This unique initiative aims to collaborate with content creators from all social media platforms who are passionate about cybersecurity and eager to share their experiences using Keeper’s industry-leading password…
Synopsys Launches Software Risk Manager to Simplify Enterprise-Scale AppSec
In today’s ever-evolving landscape, organisations recognise that software risk directly impacts their business. To effectively handle this risk, the focus is on creating scalable and efficient application security programmes. With the threat landscape becoming more challenging, the demand for streamlined…
Cyber Mindfulness Corner Company Spotlight: DXC Technology
At the IT Security Guru we’re showcasing organisations that are doing great things for employee wellbeing! This week, Mike McDaniel, President of Modern Workplace at DXC Technology, tells the Gurus about how DXC Technology are revolutionising the virtual employee workplace…
Women two-thirds more likely to fear losing CNI security jobs than men
UK critical national infrastructure (CNI) organisations are facing a dearth of diverse cyber security talent, with a disproportionate amount of women afraid their jobs may be on the line when compared with men, according to new research by leading cyber…
Security professionals unaware of NCSC Cyber Essentials framework – Lookout
New research by Lookout has revealed that there is a lack of awareness towards the NCSC Cyber Essentials framework. The endpoint-to-cloud security provider found only 28% of organisations had fully implemented Cyber Essentials, with over a third (40%) of security…
Salt Security Appoints Ori Bach as Executive Vice President of Product
API security company Salt Security has announced the appointment of Ori Bach to the Salt senior leadership team as executive Vice President of Product. With more than 15 years of experience leading product strategy at technology companies, Bach will define…
Programme for International Cyber Expo’s Global Cyber Summit 2023 Announced
International Cyber Expo has announced its programme for the annual Global Cyber Summit, sponsored by Sonatype, OpenText, and Infoblox, and hosted at Olympia London on the 26th and 27th of September 2023. The summit returns with greater international appeal. Among…
MOVEit latest: US Government services provider Maximus hit
The MOVEit attack is constantly evolving and this week a new update has occurred. Maximus Inc., a US government services provider is the latest victim of the Clop ransomware gang’s exploitation of a critical vulnerability within Progress Software Corp.’s MOVEit…
Data Loss Prevention for Small and Medium-Sized Businesses
Hybrid work models and broadly adopted cloud technology disperse operations extensively; data is moved, stored, and accessed from highly distributed locations. Within such a disseminated environment, cybersecurity hygiene concerns businesses and organisations, especially nowadays, where highly skilled cybercriminals become more…
Australian Home Affairs Leaks Sensitive Information Of Cybersecurity Survey Respondents
The Australian Home Affairs department may want to bury their heads in the sand after accidentally exposing sensitive information of more than 50 small business survey participants. Why were they being surveyed? Ironically, to get their thoughts on cybersecurity. It…
Norway government ministries hit by cyber attack
A recent cyber attack struck a significant blow to the Norwegian government, affecting a total of 12 government ministries. In response to this alarming situation, a crisis staff was promptly assembled. The government minister in charge of handling the response…
Lookout Uncovers Advanced Android Surveillanceware Linked To China’s APT41
Yesterday, Lookout, Inc., announced the discovery of sophisticated Android surveillanceware known as WyrmSpy and DragonEgg, which has been linked to the Chinese espionage group APT41 (AKA Double Dragon, BARIUM and Winnti). Despite being indicted on multiple charges by the U.S.…
Macnica and Dragos Partner to Deliver OT Cybersecurity to CNI and Manufacturing Control Systems in Japan
Dragos, the global leader in cybersecurity for Operational Technology (OT), and Macnica Corporation (Headquarters: Yokohama City, Kanagawa Prefecture, President: Kazumasa Hara, hereinafter referred to as Macnica), have signed an agency agreement to provide Dragos’s OT cybersecurity solutions in Japan, and…
Report Finds That 70% of Financial Services and Insurance Companies Have Suffered Rollout Delays Due to API Security
Today, API security company Salt Security released the findings from its first industry-focused report on API security. The report, entitled ‘State of API Security for Financial Services and Insurance’, provides in-depth insight into significant API vulnerabilities and attacker activity within…
New Outpost24 CORE Solution Announced Bringing Visibility, Cyber Resilience & Threat Mitigation
Outpost24 has launched Outpost24 CORE, a unified exposure management solution that gives visibility and real-time insights into an organisation’s IT asset inventory. The solution can also provide analysis into the threat exposure across the entire attack surface. “Raising awareness in…
Millions of Keyboard Walk Patterns Found in Compromised Passwords
Today, the Specops Software research team revealed the results of their latest findings on the use of keyboard walk patterns in compromised passwords. The top keyboard walk pattern found in compromised password was ‘qwert’, followed by ‘qwerty’ which found in…
Dragos Accelerates Growth in Europe, Expands Leadership Team
Today, Dragos Inc., who provide cybersecurity protection for industrial controls systems (ICS) and operational technology (OT) environments, announced its deepening commitment to Europe to provide industrial and critical infrastructure organisations in the region with the Dragos Platform, threat intelligence, and services…
Rootshell Security works with Microsoft to identify three vulnerabilities
Cybersecurity firm Rootshell Security has had a busy month, earning recognition for its recent work that led to the identification of three significant vulnerabilities within Microsoft’s suite of applications. Its RedForce team, known for a persistent commitment to a…
Users of Honeywell Experion DCS Platforms urged to patch 9 vulnerabilities immediately
Today, Armis and Honeywell have jointly disclosed Crit.IX, 9 new vulnerabilities that Armis researchers found in the Honeywell Experion® DCS platforms (7 of which are critical). These flaws could allow for unauthorised remote code execution on both legacy versions of…
Lookout Announces Operations in Mainland China
Yesterday, Lookout, Inc. announced Lookout China Connect, an extension of the Lookout Cloud Security Platform operating in mainland China. Lookout China Connect simplifies connectivity for remote workers in mainland China without the complexity of a private network, all while complying with…
Salt Security Chosen to Protect APIs as Part of Application Modernisation at Jemena
Today, Salt Security have announced that Jemena, an energy supplier across the east coast of Australia and the Northern Territory, has chosen Salt to protect its critical gas and electricity infrastructure. Integrating seamlessly within Jemena’s AWS environment, Salt provides Jemena…
New research finds less than half of SMBs use Privileged Access Management
Most successful breaches involve stolen or compromised credentials that are used to escalate privileges and move laterally across a network, something which privileged access management (PAM) offerings are ideally suited to protect against. Keeper Security, the leading provider of zero-trust…
Security Serious Unsung Heroes Awards 2023 have launched
Eskenzi PR has today opened nominations for its eighth annual Security Serious Unsung Heroes Awards. The awards are all about celebrating the UK’s cybersecurity professionals, teachers, lecturers, leaders and those working to make the industry not only more secure, but…
HCA Healthcare Falls Victim to Data Security Incident
One of the largest healthcare providers in the US, HCA confirmed the breach on Monday 10 July. The data was taken from an external storage location exclusively used to automate the formatting of email messages. Taken from its statement, HCA…
Cato Networks Extends ZTNA to Protect Against Insider Threats
Cato Networks, provider of the world’s leading single-vendor SASE platform, addressed mounting security concerns posed by insider threats. Over the past two years, incidents related to insider threats have grown 44%, according to the Ponemon Institute,1 with the cost per…
Cyber Mindfulness Corner Company Spotlight: Exabeam
At the IT Security Guru we’re showcasing organisations that are doing great things for employee wellbeing! This week, Gianna Driver, Chief Human Resource Officer at Exabeam, tells the Gurus about how Exabeam are championing wellbeing support within the organisation. Driver…
Over Half of People Have Felt Socially Excluded In Past Year
New research from health provider Bupa in partnership with ParalympicsGB found that 58% of Brits have felt excluded in the past year, resulting in poor mental health (30%) and isolation (41%). The research also found that feelings of exclusion has…
Why I started the Security Serious Unsung Heroes Awards
I don’t typically like awards; let’s be honest, more often than not, they’re pay to play – and most of us see them for what they are! It begs the question; how come we ended up running an award…
Dragos Hosts Inaugural Dragos European Forum For Industrial Asset Owners and Operators
To celebrate their European expansion, Dragos Inc. held its first Dragos Europe Forum at the iconic Battersea Power Station June 26-28. The event brought together members of the operational technology (OT) community to inform, exchange ideas, and network. The event…
Cato SASE Cloud Identified as a “Leader” in GigaOm’s Secure Service Access (SSA) Ranking
Today, Cato Networks announced that it was named a “Leader” and “Outperformer” by GigaOm for the second year running. The ranking was listed in the research firm’s Radar Report for Secure Service Access (SSA), GigaOm’s term for SASE. The report’s comprehensive review…
Adarma Expands MDR Offering with Integrated Digital Forensics and Incident Response Capabilities
The post Adarma Expands MDR Offering with Integrated Digital Forensics and Incident Response Capabilities appeared first on IT Security Guru. This article has been indexed from IT Security Guru Read the original article: Adarma Expands MDR Offering with Integrated Digital…
Breaking it Down: What You Need to Know About Data Breaches
One of the most pressing cybersecurity concerns for organisations today is preventing the exfiltration of sensitive data. Even companies whose main focus is not digital or technological in nature have to manage, store, send, and receive considerable amounts of data…
Why Schools are Low-Hanging Fruit for Cybercriminals
Hackers are increasingly targeting schools as technology is being integrated more deeply into teaching. Educational institutions own many sensitive data, such as personnel and financial information, as well as intellectual property. Unfortunately, many schools lack adequate cybersecurity measures, making them…
Crack the Code: How to Secure Your Dream Cybersecurity Career
With cyber threats constantly dominating headlines, the draw of a career in cybersecurity has never been higher for young professionals. The huge increase in cyberattacks across various sectors has fuelled a demand for skilled individuals who can safeguard data for…
Six years on from NotPetya: an analysis from Tom Gol, CTO for research at Armis
Six years have passed since the infamous NotPetya cyber attack sent shockwaves through the cybersecurity landscape. Initially disguised as ransomware, NotPetya quickly revealed its true destructive nature, spreading damage to businesses and governments around the world, resulting in billions of…
Cato Networks Revolutionizes Network Security with Real-Time, Machine Learning-Powered Protection
Cato Networks, provider of the world’s leading single-vendor SASE platform, introduced today real-time, deep learning algorithms for threat prevention as part of Cato IPS. The algorithms leverage Cato’s unique cloud-native platform and vast data lake to provide highly accurate identification of…
Zombie API vs Shadow API: The Crashtest
The 1954 novel, “I Am Legend,” played a major role in the development of the modern zombie and vampire genre. As far as the main character, Robert Neville, knows, he’s the last survivor of the pandemic that turned everyone else…
CISO Speaks: Resilience and Avoiding Burnout
We talk a lot in security about ‘burnout’. But we spend a lot less time talking about how to build resilient humans to minimise the risk of burnout… This feels like we have fallen into the same trap with western…
Digital-First Economy Has Transformed Role of CISO
A new global survey by Salt Security has found that a digital-first economy has introduced unforeseen risks for nearly 90% of CISOs. The findings were revealed earlier this week in a new “State of the CISO 2023” report. Conducted by…
More than 1 in 3 UK&I workers are likely to click a phishing link
New research has found over 1 in 3 UK&I workers are likely to click a phishing link, according to KnowBe4’s 2023 Phishing by Industry Benchmarking Report. The report measures an organisation’s Phish-prone™ Percentage (PPP), which shows the likelihood employees will…
Cato Networks Recognized as Global Security Service Edge (SSE) Leader
Cato Networks, provider of the world’s leading single-vendor SASE platform, announced today that it has been awarded the 2023 “Product Leadership Award” by Frost & Sullivan for its Cato SSE 360, a key component of the Cato SASE Cloud platform.…
Cost-of-Living Crisis increasing chances of Insider threats
A new study conducted by CyberSmart has revealed that nearly half of UK SMEs (47%) believe they are at greater risk of a cyberattack since the onset of the cost-of-living crisis. Of these respondents, 38% believe this is due to…
Cost-of-Living Crisis increasing changes of Insider threats
A new study conducted by CyberSmart has revealed that nearly half of UK SMEs (47%) believe they are at greater risk of a cyberattack since the onset of the cost-of-living crisis. Of these respondents, 38% believe this is due to…
New Survey Reveals Critical Data Security Gap In the Financial Services Industry
A recent study from Lookout, Inc., has released new findings that showcase the rise of data breaches in the financial services industry. The report found that 70% of IT leaders surveyed via the Gartner Peer Community reported a significant increase in…
IT Security Guru study shows over one in ten Brits are willing to engage in ‘illegal or illicit’ online behaviour as the Cost of Living crisis worsens
The IT Security Guru, working in conjunction with market research firm Censuswide and cybersecurity PR agency Eskenzi PR, has uncovered some shocking statistics relating to scams and the cost of living crisis. The results of the survey found that 11%…
DTX highlights top 50 innovators driving digital change across the North West
In celebration of the individuals making a massive impact to the digital journeys of some of the region’s biggest organisations DTX has launched its top 50 list for 2023. These are the innovators, the community builders and the unsung heroes…
Synopsys Recognised as a Leader in Software Composition Analysis by Independent Research Firm
Synopsys, Inc. (Nasdaq: SNPS) today announced it has been recognised as a leader in The Forrester Wave™: Software Composition Analysis, Q2 2023. The report identifies the 12 most significant vendors in the software composition analysis (SCA) market and evaluates them against…
Cato Networks Breaks SASE Speed Barrier (Again) With 5 Gbps Encrypted Tunnels to Sites and the Cloud
Cato Networks, provider of the world’s leading single-vendor SASE platform, announced today a new SASE throughput record, achieving 5 Gbps on a single encrypted tunnel with all security inspections enabled. Cato is also simplifying multicloud and hybrid cloud networking and…
Dragos Launches OT Cyber Industry’s Only Global Partner Program to Span Technology, Services, Threat Intelligence, and Training
Today, Dragos Inc. has announced the launch of the Dragos Global Partner Program, the only channel program to comprise OT cybersecurity technology, services, and threat intelligence. The Dragos Partner Program also offers training that prepares partners as experts who can…
Art = Human + Machine
From Jens-Peter Sjöberg, Lord of the Rings CGI artist and co-founder and Creative Director at Swedish video tech pioneers Phyron As a creative and filmmaker, I’ve always been fascinated by the intersection of technology and art. Generative AI models such…
Armis Identifies Riskiest OT and ICS Devices across CNI
Armis has released new research identifying the riskiest devices that pose threats to critical infrastructure industries: manufacturing, utilities and transportation. Data analysed from the Armis Asset Intelligence and Security Platform, which tracks over three billion assets, found that the operational technology (OT) and…
Understanding Neurodiversity in the Workplace to Create a Better Workplace Environment for Everyone
Today, mental health, thankfully, is more widely understood as a vital aspect of overall well-being. It impacts our emotional, psychological, and social functioning. However, for neurodivergent individuals, who possess unique neurological differences such as autism, ADHD, or dyslexia, prioritizing mental…
Clop Ransomware Gang Extorts Household Names including BBC, British Airways and Boots
This week, it was discovered that cybercriminals had exploited an ongoing vulnerability in Progress Software’s MOVEit file transfer app to infiltrate the systems of payroll company, Zellis. According to its website, 42% of the FTSE 100 are Zellis customers and…
Developers Kept Away From Coding, Estimated £10.4bn a Year Wasted
Research by software delivery platform Harness suggests that UK businesses are inadvertently wasting over £10.4bn per year as a result of lack of software productivity, mainly due to developers having to manually carry out routine operations that could be automated…
Employees Feel 10 Times Calmer in an Environmentally Friendly Office Space
For most organisations and employees, the workplace has transformed over the last few years. No doubt, at least in part, due to the pandemic. For business leaders, it’s harder than ever to work out the best approach to the workplace…
Outpost24 Acquires EASM Provider Sweepatic
Cybersecurity risk management specialists Outpost24 have today announced the acquisition of Sweepatic. Based in Leuven, Belgium, Sweepatic is an innovative external attack surface management (EASM) platform. Gartner identified EASM as a top Security and Risk Management (SRM) trend for 2022.…
J Brand: The Challenges of Putting Mental Health First in an Unfamiliar Industry
Working in the electrical and data industry, mental health was long an afterthought or even entirely forgotten. It just was not seen as a business priority. Thankfully, that has now been turned on its head and the psychological wellbeing of…
UK Organisations lack clear path to achieve threat intelligence
New research by Armis shows organisations in the U.K. are facing immediate cybersecurity challenges stemming from a heightened regulatory environment, staffing and recruitment difficulties and an expanded attack surface. In this complex environment, threat intelligence has become the top priority on…
Half of UK Employees Suffer From “Sunday Scaries”
In today’s world, there are so many buzz words around work, from quiet quitting to Bare Minimum Mondays. But Sunday Scaries are the latest phenomenon. We all know the feeling: it’s a Sunday evening and Monday morning looms, causing for…
A Roadmap for Becoming a Penetration Tester in 2023
Few areas of cybersecurity measure up against penetration testing in terms of importance and excitement. This activity boils down to finding flaws in computer systems so that organizations can address them proactively and forestall real-world attacks. A pentester worth their…
Salt Security Attains AWS Security Competency Status
Today, Salt Security announced that it has achieved Amazon Web Services (AWS) Security Competency status in the Application Security category. Salt is the only API security company to have earned AWS Security Competency. Having this certification differentiates Salt as an…
Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud
With 12 years of years of patented development and IP innovation, this week, Centripetal announced the launch of CleanINTERNET® CLOUD. The expansion aims to extend protection to enterprise assets anywhere – whether on premises, remote or in the cloud. CleanINTERNET®…
New security model launched to eliminate 95% of cyber breaches
A new security model has been launched this week, dubbed Access Segmentation and Encryption Management (ASEM), which is being touted as the most comprehensive cybersecurity protection available today. The model, which is currently only available through MyCena Security Solutions, addresses…
Tips to Protect Against Holiday and Airline Scams
Summer holidays are fast approaching, and many of us are eagerly planning our vacations. Whether it’s a long-awaited reunion with loved ones, a leisurely exploration of a new destination, or simply an adventure in the making, booking a holiday is…
KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool
KnowBe4 has launched its new and complementary QR Code Phishing Security Test (QR Code PST) tool. The no-charge tool assists organisations in identifying users that are most susceptible to scanning malicious QR codes. Many organisations are aware of the typical social engineering techniques used…
Salt Security Uncovers API Security Flaws in Expo Framework, Issues have been Remediated
Today, Salt Security released new threat research from Salt Labs that details several critical security flaws in the Expo framework. The flaws were found in the implementation of the Open Authorization (OAuth) social-login functionality utilised by Expo which had the potential to…
Gartner Names Synopsys Leader in Application Security Testing for Seventh Consecutive Year
Synopsys, Inc. (Nasdaq: SNPS) today announced it has been named by Gartner, Inc. as a Leader in the “Magic Quadrant™ for Application Security Testing” for the seventh consecutive year.1 In the report, Gartner evaluated 12 application security testing vendors based on…
How Your Business Could Protect Its Cybersecurity in a Surprisingly Cost-Effective Fashion
Cybersecurity is critical to any company. It helps to protect your organisation, workforce and clients from cyber-attacks. By doing this, you are reducing the chance of identity theft, data breaches, ransomware, and many other types of cyber threats. Your company…
How to Streamline Communication with Microsoft Teams Operator Connect
In today’s modern workplace, clear and efficient communication is essential for teams to work collaboratively and achieve their goals. As remote work becomes increasingly common, it’s more important than ever to have tools that streamline communication and make it easier…
Using Tech For Good: Introducing The Zensory
“We know that there’s a problem within the cybersecurity industry when it comes to burnout – and it’s a problem that’s only getting worse.” That’s what Yvonne Eskenzi, Co-Founder of wellbeing and productivity app The Zensory, has noticed over the…
How to prevent against the 5 main types of insider threats
Over one in ten data breaches originate from a malicious insider, and they cost companies $4.18 million dollars per incident. And that’s only the malicious ones. According to the 2023 Insider Threat Report by Cybersecurity Insiders, nearly three-fourths (74%) of…
Toyota Japan confirms decade-long security breach affecting more than 2M customers
Japanese auto firm, Toyota, recently announced that a decade-long data breach in its online service has compromised information on more than 2 million vehicles at risk. Customers affected included those who signed up for the T-Connect network service between the…
Multiple Vulnerabilities Found in the Kiddoware Kids Place Parental Control Android App
Kiddoware is the world’s leading parental control solutions company with a wide range of products and serving over 5 million families worldwide. Kiddoware is committed in helping you to protect your kids while providing you intelligence to be proactive about…
Time Taken For Hackers to Crack Passwords Revealed
New Specops Software research has unearthed the length of time it takes modern attackers to brute force user passwords. Plain text password storage is rare in these modern times, requiring attackers to adopt password cracking methods to make use of…
Mental Health Awareness Week: Improving Cyber Mindfulness with KnowBe4’s Anna Collard
This week is Mental Health Awareness Week which KnowBe4’s Anna Collard says is the perfect time to pause, take a breath and think about cyber mindfulness. According to research, over half (52%) of people surveyed admitted that stress causes them…
Adarma Announces Management Expansion Amid Rapid Growth
Edinburgh-based Adarma, the leading independent specialist in detection and response services, welcomes three new leaders to its cybersecurity services delivery team. The appointments of Donna Goddard as Head of Security Engineering; Matthew Hmoud as Head of Security Consulting; and Richard…
International Cyber Expo 2023 – Registration is now OPEN
Registration for this year’s International Cyber Expo (ICE) on the 26th and 27th of September 2023 at London Olympia is now open. The award-winning security event will once again showcase an impressive line-up of talks, demonstrations, and senior-level roundtable discussions…
The Future is (Cyber) Mindful
In cybersecurity, a vulnerability is a weakness. It’s a bad thing. Defences must be strong, unbreakable, and hardened against threats 24/7. The same sentiment seems to extend to its professionals, whether we recognise it or not. As a result, a…
Discord Suffers Data Breach Through Compromised Third Party
Popular social media platform Discord has notified users it has suffered a data breach after a support agent’s account at a third party became compromised. A malicious individual then gained unauthorised access to the agent’s support queue, exposing user email…
Risk of cyber-attack “worry” for Eurovision contest
While there is no specific intelligence about an attacked planned for the weekend, experts from the UK’s National Cyber Security Centre have been drafted to help minimise the risk of sabotage. Broadcasters’ main worry suffering an attack from pro-Russian hackers…
Introducing the IT Security Guru’s brand-new cyber mindfulness corner: a peer-to-peer hub full of advice for battling burnout, mental health support resources, and the latest cyber-mindfulness related news. We aim to champion a more mindful industry, alongside professionals who share…
Why Should You Take IT Security Seriously?
The lax attitude to cyber security by a large percentage of internet users never fails to amaze and bamboozle IT security specialists. People seem to have a blasé attitude towards their online safety, probably because they do not believe anything…
Salt Security Achieves AWS WAF Ready Designation
Today, API security company Salt Security announced it is now an Amazon Web Service (AWS) Web Application Firewall (WAF) Ready Partner. This service helps customers discover Partner solutions validated by AWS Partner Network (APN) Solutions Architects that integrate with AWS…