What is network forensics?
A magnifying glass searching code for fingerprints
cyber attacks

What is network forensics?

Taking a closer look at how cyber threats are investigated at a network level
7 Dec 2021
Spar stores forced to close following supply chain attack
Spar Express Storefront in Ireland
cyber attacks

Spar stores forced to close following supply chain attack

The UK supermarket chain is working with the NCSC to investigate the incident
7 Dec 2021
NSO Group reportedly hacked multiple US officials
The NSO Group logo on a smartphone that's been placed on a keyboard
spyware

NSO Group reportedly hacked multiple US officials

Apple informed the US State Department that it found a number of cases of staff iPhones being hacked with Pegasus spyware
6 Dec 2021
BitMart suspends withdrawals following hack
An image of cryptocurrency stock markets on a screen
cryptocurrencies

BitMart suspends withdrawals following hack

Hackers managed to get away with at least $150 million (£113 million) in cryptocurrencies
6 Dec 2021
RNLI takes website offline after suspected cyber attack
RNLI boat
hacking

RNLI takes website offline after suspected cyber attack

The charity has not linked the incident to the recent pressure campaign from Britain First
6 Dec 2021
Meta makes 2FA mandatory for high-risk users
A smartphone showing the Meta company logo in front of a large Facebook logo
two-factor authentication (2FA)

Meta makes 2FA mandatory for high-risk users

Journalists and activists must adopt extra protective measure under new rule
3 Dec 2021
Ubiquiti data breach orchestrated by “trusted insider”, says DoJ
Department of justice sign on a building
data breaches

Ubiquiti data breach orchestrated by “trusted insider”, says DoJ

Software engineer Nickolas Sharp faces 37 years in prison for allegedly exploiting his access credentials to extort his employer
2 Dec 2021
Over 300,000 Android users downloaded banking trojan malware
Trojan virus within binary code
hacking

Over 300,000 Android users downloaded banking trojan malware

Hackers defeated Google Play restrictions by using smaller droppers in apps and eliminating permissions needed
30 Nov 2021
Flaw in Android phones could let attackers eavesdrop on calls
A red Android mascot
Google Android

Flaw in Android phones could let attackers eavesdrop on calls

The vulnerable chips are thought to be present in 37% of all smartphones worldwide
26 Nov 2021
CL0P hacking group hits Swire Pacific Offshore
A hacker wearing black gloves using a laptop keyboard
hacking

CL0P hacking group hits Swire Pacific Offshore

The notorious group thought to be behind the Accellion hack this year published rafts of personal information belonging to the company's employees on …
25 Nov 2021
Microsoft patch fails to fix Installer zero-day affecting every version of Windows
Red lock unlocked among several blue locked locks
zero-day exploit

Microsoft patch fails to fix Installer zero-day affecting every version of Windows

The exploit allows hackers to elevate privileges and create admin accounts
25 Nov 2021
Hackers use Linux backdoor on compromised e-commerce sites with software skimmer
Small shopping cart on a keyboard
malware

Hackers use Linux backdoor on compromised e-commerce sites with software skimmer

Cyber criminals in China control the malware
19 Nov 2021
Iranian hackers ramp up attacks against IT services sector
The flag of Iran depicted in programming code
hacking

Iranian hackers ramp up attacks against IT services sector

Microsoft security researchers warn hacking is part of broader cyber espionage effort
19 Nov 2021
TikTok phishing campaign tried to scam over 125 influencer accounts
The TikTok logo on an application store accessed from a smartphone
social media

TikTok phishing campaign tried to scam over 125 influencer accounts

Hackers threatened to delete accounts over copyright violations
18 Nov 2021
Iranian hacking groups are evolving, warns Microsoft
A hacker wearing black gloves using a laptop keyboard
hacking

Iranian hacking groups are evolving, warns Microsoft

Cyber espionage groups are increasingly utilizing ransomware to either collect funds or disrupt their targets
17 Nov 2021
How do you become an ethical hacker?
An image of silhouetted man walking through a keyhole, symbolising a hacker unlocking a computer system
ethical hacking

How do you become an ethical hacker?

We examine what certifications do you need, what jobs are available and how much you can expect to be paid
17 Nov 2021
Alibaba ECS instances targeted in new cryptojacking campaign
A view of Alibaba's headquarters in China
cryptocurrencies

Alibaba ECS instances targeted in new cryptojacking campaign

Cyber criminals have been disabling security features in the cloud to mine for Monero
16 Nov 2021
FBI hacker is selling Robinhood customer data on hacking forum
A hacker wearing black gloves using a laptop keyboard
data breaches

FBI hacker is selling Robinhood customer data on hacking forum

The threat actor is looking for a minimum offer of “five figures” for the data, which includes seven million email addresses
16 Nov 2021
What is Emotet?
Trojan horse on a red laptop screen with blind justice in front of it
hacking

What is Emotet?

A deep dive into one of the most infamous and prolific strains of malware
16 Nov 2021
Smart luggage is not so smart when it comes to cyber security
Smart luggage in an airport
cyber security

Smart luggage is not so smart when it comes to cyber security

If luggage owners aren’t careful, hackers could use app to steal baggage
15 Nov 2021
Black Hat Europe: ‘Failures in tech governance are eroding democracy’
An image of the keynote stage lit up at Black hat Europe 2021
cyber security

Black Hat Europe: ‘Failures in tech governance are eroding democracy’

Stanford University’s Marietje Schaake claims those in power ‘effectively condone’ attacks on democracy every day strong regulations aren’t introduced
10 Nov 2021
Iranian hackers targeting telcos and ISPs using upgraded malware
Red skull and crossbones atop binary code
hacking

Iranian hackers targeting telcos and ISPs using upgraded malware

New report shines a light on Lyceum cyberespionage group
10 Nov 2021
Hackers abuse poorly secured Docker Hub accounts to mine cryptocurrency
Bitcoin cryptocurrency mining
hacking

Hackers abuse poorly secured Docker Hub accounts to mine cryptocurrency

TeamTNT behind new campaign to install crypto miners on containers
10 Nov 2021