What is ransomware?
Male hacker hand on laptop computer keyboard with red binary screen of ransomware attack
ransomware

What is ransomware?

This type of malware could hit you hard in the pocket
7 May 2021
Researchers show how hackers can easily 'clog up' neural networks
A female monkey and her child classified by AI
neural network

Researchers show how hackers can easily 'clog up' neural networks

The Maryland Cybersecurity Center warns deep neural networks can be tricked by adding more 'noise' to their inputs
7 May 2021
Weekly threat roundup: Dell, Apple, Qualcomm
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
vulnerability

Weekly threat roundup: Dell, Apple, Qualcomm

Pulling together the most dangerous and pressing flaws that businesses need to patch
6 May 2021
Qualcomm modem flaw puts millions of Android users at risk
The Android robot in front of lines of code
Google Android

Qualcomm modem flaw puts millions of Android users at risk

Vulnerability found in the chipmaker's Mobile Station Modem could allow hackers to listen to user conversations, although Qualcomm has downplayed the …
6 May 2021
Microsoft launches open source tool Counterfeit to prevent AI hacking
Microsoft logo suspended above a conference floor
artificial intelligence (AI)

Microsoft launches open source tool Counterfeit to prevent AI hacking

Businesses can use preloaded attack algorithms to test their machine learning systems
4 May 2021
IoT privacy and security concerns
A secure network depicted by connected padlocks
Security

IoT privacy and security concerns

We take a look at what's needed to really secure internet-connected devices
30 Apr 2021
Weekly threat roundup: Nvidia, Linux, macOS
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
vulnerability

Weekly threat roundup: Nvidia, Linux, macOS

Pulling together the most dangerous and pressing flaws that businesses need to patch
29 Apr 2021
Hackers could abuse legitimate Windows AD FS to steal data
padlock in a tech setting
Microsoft Windows

Hackers could abuse legitimate Windows AD FS to steal data

The flaw in Microsoft authentication servers could enable threat actors to perform a Golden SAML attack
28 Apr 2021
Ransomware gang is selling intel to traders to extort victims
Desktop monitor and mobile phone with hand pointing
ransomware

Ransomware gang is selling intel to traders to extort victims

The scheme relies on market traders using information about ransomware attacks to short-sell shares and collapse a victim's stock price
26 Apr 2021
4chan founder Chris Poole leaves Google
A Google kitchen area at one of its offices
Careers & training

4chan founder Chris Poole leaves Google

Poole, who founded 4chan at 15, was a controversial hire back in early 2016
23 Apr 2021
What is hacktivism?
Two masked members of Anonymous demonstrating during the Occupy protest on October 15, 2011 in The Hague
hacking

What is hacktivism?

From Anonymous to Omega, here’s everything you need to know about hackers with a conscience
22 Apr 2021
Weekly threat roundup: Google Chrome, Pulse Secure, Telegram
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
vulnerability

Weekly threat roundup: Google Chrome, Pulse Secure, Telegram

Pulling together the most dangerous and pressing flaws that businesses need to patch
22 Apr 2021
NCSC offers free training to schools after rise in cyber attacks
Two students using a PC in a classroom
cyber security

NCSC offers free training to schools after rise in cyber attacks

Both universities and school trusts have been hit by a number of devastating cyber attacks in 2021
22 Apr 2021
REvil threatens to release Apple’s hardware schematics
Visual representation of ransomware by showing encrypted files on a display
ransomware

REvil threatens to release Apple’s hardware schematics

The ransomware gang has tied its extortion scheme to the firm’s latest launch event
21 Apr 2021
Hackers exploit Pulse Secure VPN flaws in sophisticated global campaign
A hacker wearing glasses in a dark room with the Chinese flag shown in the background on a computer display
hacking

Hackers exploit Pulse Secure VPN flaws in sophisticated global campaign

Chinese-backed groups have been spying on US and European organisations including those in the defence industry
21 Apr 2021
UK’s IoT security regulation will also include smartphones
Smiling man using smartphone at a coffee shop
Internet of Things (IoT)

UK’s IoT security regulation will also include smartphones

Manufacturers will be required to inform consumers how long their device will receive security software updates
21 Apr 2021
How does a SQL injection attack work?
SQL injection
hacking

How does a SQL injection attack work?

Understanding one of the simplest, yet most effective, methods of cyber attack
16 Apr 2021
HackBoss malware is using Telegram to steal cryptocurrency from other hackers
A collection of various coins with cryptocurrency logos embedded onto them
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

Hackers stealing from wannabe hackers using fake software
16 Apr 2021
US, UK say Russia was behind SolarWinds hack
Solarwinds logo seen on the smartphone screen, with simple C attack code on the paper background.
cyber attacks

US, UK say Russia was behind SolarWinds hack

President Joe Biden issues sanctions against 32 entities and officials, as well as expelling 10 diplomats
16 Apr 2021
Weekly threat roundup: Chrome, Exchange Server, IoT devices
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
vulnerability

Weekly threat roundup: Chrome, Exchange Server, IoT devices

Pulling together the most dangerous and pressing flaws that businesses need to patch
15 Apr 2021
University of Hertfordshire's entire IT system offline after cyber attack
A birds-eye view of the University of Hertfordshire
cyber attacks

University of Hertfordshire's entire IT system offline after cyber attack

Online classes are cancelled as every IT system is taken down by the attack
15 Apr 2021
Russia launched over a million cyber attacks in three months
Abstract silhouette of a computer hacker in front of a Russian flag
hacking

Russia launched over a million cyber attacks in three months

Unit 42 researchers found 75% of the attacks were critical
13 Apr 2021
BRATA malware disguises itself as security tools on Google Play
The Google Play Store application as shown on a smartphone display
malware

BRATA malware disguises itself as security tools on Google Play

Hackers are tricking victims into granting their malicious apps certain permissions before taking control of Android devices
13 Apr 2021