Security

What is cloud-to-cloud backup?
Multi cloud illustration on a blue and orange coloured background, with real cloud images overlaid
cloud backup

What is cloud-to-cloud backup?

C2C backup is growing in popularity, so what is it, and how can it help your business if the worst happens?
1 Mar 2021
Lazarus APT hacking group is targeting the defense industry
A concept image of a hacker behind a stream of binary
Security

Lazarus APT hacking group is targeting the defense industry

North Korea-linked hackers used ThreatNeedle backdoor to gather sensitive data
26 Feb 2021
Microsoft open sources CodeQL queries used in Solorigate inquiry
Microsoft sign attached to a building
Security

Microsoft open sources CodeQL queries used in Solorigate inquiry

The tool enables developers to scan their code for potential compromises
26 Feb 2021
CISA warns of ongoing Accellion File Transfer Appliance attacks
Unknown hacker on a computer in a dark room
hacking

CISA warns of ongoing Accellion File Transfer Appliance attacks

Attacks have hit federal, state, and local governments
25 Feb 2021
What is a Trojan?
Toy horse on a digital screen to symbolise the attack of the Trojan virus
Security

What is a Trojan?

The malicious malware lurks behind legitimate software to invade your computer
25 Feb 2021
Cyber security firm saw attacks rise by 20% during 2020
Finger pointing towards malware on a piece of code
cyber security

Cyber security firm saw attacks rise by 20% during 2020

Trend Micro found attackers also heavily targeted VPNs
23 Feb 2021
What to look for in a secure cloud system
Cloud padlock resting on laptop with city skyline behind
cloud security

What to look for in a secure cloud system

Not all cloud products support the same level of security, so what should organisations be looking out for?
23 Feb 2021
Hackers turn to 'silent stealing' in bid to exploit home workers
Man holding an empty wallet with laptop in background
scams

Hackers turn to 'silent stealing' in bid to exploit home workers

Cyber criminals are abandoning large-scale heists in favour of scams that earn them significantly smaller amounts of money
22 Feb 2021
Kia Motors allegedly suffers a ransomware attack
Kia sign with a red background
data breaches

Kia Motors allegedly suffers a ransomware attack

Hackers demanding a $20 million ransom to release a decryptor
18 Feb 2021
UK's cyber security industry defies tumultuous 2020
A female IT worker in front of multiple monitors displaying code
cyber security

UK's cyber security industry defies tumultuous 2020

Although 3,800 security jobs were created, recruitment, expansion and financial growth slowed sharply against the previous year
18 Feb 2021
Donald Trump’s one-time law firm allegedly suffers data breach
Data breach
data breaches

Donald Trump’s one-time law firm allegedly suffers data breach

Hackers claim to have stolen 100GB of confidential files belonging to the Jones Day law firm
17 Feb 2021
Executives have serious concerns over VPN security
VPN software displayed on a laptop
virtual private network (VPN)

Executives have serious concerns over VPN security

Zero-trust access stands out as an alternative to VPNs
16 Feb 2021
Sontiq's Intelligent Identity Security platform will combat online fraud
Sontiq corporate image on a blue-green background
Security

Sontiq's Intelligent Identity Security platform will combat online fraud

Sontiq’s resolution specialists team will deliver ‘white glove’ security resolutions
16 Feb 2021
Microsoft: ‘More than 1,000 engineers’ executed SolarWinds attack
A group of hackers behind the Russian flag
cyber warfare

Microsoft: ‘More than 1,000 engineers’ executed SolarWinds attack

The company's president Brad Smith says the ongoing hack is the 'largest and most sophisticated the world has ever seen'
15 Feb 2021
Mastering endpoint security implementation
Endpoint protection or endpoint security interlocking gears
Security

Mastering endpoint security implementation

More devices connecting to the corporate network means more security risks. Here are some of the ways to protect your business
12 Feb 2021
Weekly threat roundup: Zero-days in Windows, Adobe, Google Chrome
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
vulnerability

Weekly threat roundup: Zero-days in Windows, Adobe, Google Chrome

Pulling together the most dangerous and pressing flaws that businesses need to patch
11 Feb 2021
Senators criticize the ‘disjointed and disorganized’ SolarWinds hack response
Close up of Senator Marco Rubio speaking
Policy & legislation

Senators criticize the ‘disjointed and disorganized’ SolarWinds hack response

Intelligence Committee chiefs call for coordinated action
10 Feb 2021
Multiple TCP/IP stack flaws could leave millions of devices open to attack
padlock on a binary code background
vulnerability

Multiple TCP/IP stack flaws could leave millions of devices open to attack

The stacks are susceptible to Mitnick attacks
10 Feb 2021
How do you become an ethical hacker?
Figure walking through keyhole
ethical hacking

How do you become an ethical hacker?

What certifications do you need, what jobs are available and how much is the salary?
10 Feb 2021
'BendyBear' APT malware linked to Chinese government hackers
Malware in code
malware

'BendyBear' APT malware linked to Chinese government hackers

Security researchers warn that the malware’s anti-analysis techniques make it exceptionally difficult to detect
9 Feb 2021
The truth about ransomware
An abstract image showing a man trying to connect to a computer encrypted by ransomware
Security

The truth about ransomware

Data-stealing malware can bring the biggest business to its knees – but what is the real ransomware risk, and how do you safeguard against it?
9 Feb 2021
The truth about ransomware
An abstract image showing a man trying to connect to a computer encrypted by ransomware
Security

The truth about ransomware

Data-stealing malware can bring the biggest business to its knees – but what is the real ransomware risk, and how do you safeguard against it?
9 Feb 2021
Managing employee security risks during lockdown
A man working on a laptop
Security

Managing employee security risks during lockdown

COVID-19 doesn’t have to compromise your organisation’s security
8 Feb 2021