Security

The 4 most notorious hackers
Edward Snowden picture
hacking

The 4 most notorious hackers

From Snowden to Mitnick, we trace the lives of those who hack
12 Oct 2021
NCSC CEO warns ransomware presents "most immediate danger" to the UK
The NCSC website under a magnifying glass
ransomware

NCSC CEO warns ransomware presents "most immediate danger" to the UK

Lindy Cameron named Russia as the main culprit behind the UK’s ransomware woes
12 Oct 2021
Microsoft mitigated 'largest ever' 2.4Tbps DDoS attack
The word DDoS in red shown through a magnifying glass
distributed denial of service (DDOS)

Microsoft mitigated 'largest ever' 2.4Tbps DDoS attack

The record-breaking attack targeted one of the company's European Azure customers in August
12 Oct 2021
Is Australia becoming a surveillance state?
The Australian flag seen in the reflection of a CCTV camera
privacy

Is Australia becoming a surveillance state?

With new powers granted to law enforcement agencies in Australia, we examine what this could mean for digital rights in the country
11 Oct 2021
FontOnLake: "Sophisticated" malware targets Linux systems
Malware in code
malware

FontOnLake: "Sophisticated" malware targets Linux systems

The malware stands out for its ability to maintain persistence on the infected system
11 Oct 2021
Pacific City Bank confirms it was hit by ransomware
Visual representation of ransomware by showing encrypted files on a display
ransomware

Pacific City Bank confirms it was hit by ransomware

Hackers accessed files including documents related to loan applications, such as tax returns, Form W-2 information, and payroll records
11 Oct 2021
Singapore launches new cyber security framework
Singapore skyling showing its business district
Careers & training

Singapore launches new cyber security framework

The country is aiming to create a foundation to attract and develop talent in its operational technology cyber security sector
11 Oct 2021
Best Linux distros 2021
Graphic introducing the showcase of the best Linux distros
operating systems

Best Linux distros 2021

Whether it's for desktop, server or security, there's bound to be a Linux distro for you
11 Oct 2021
Senators urge FTC to enforce child privacy laws
The FTC crest on a building
privacy

Senators urge FTC to enforce child privacy laws

Lawmakers wrote to the FTC Commissioner, asking her to enforce new child protection measures
8 Oct 2021
What is NotPetya?
Graphic showing the NotPetya logo on a laptop
ransomware

What is NotPetya?

We take a look at the malware that first came to prominence in 2016 and targets Windows-based machines
8 Oct 2021
Best free malware removal tools 2021
Malware spotted in red code on black background
Security

Best free malware removal tools 2021

Worried your device is infected? Here are the tools you need to get rid of malicious software
8 Oct 2021
BrewDog app flaw exposed data on 200,000 shareholders and customers, researchers claim
Different types of BrewDog beer cans stacked in a pile
data breaches

BrewDog app flaw exposed data on 200,000 shareholders and customers, researchers claim

Researchers at Pen Test Partners say API token exploit could have allowed hackers to access personal information and account details
8 Oct 2021
SolarWinds hackers stole US sanctions policy data, Microsoft confirms
llustration of Joe Biden and Vladimir Putin over world map
cyber attacks

SolarWinds hackers stole US sanctions policy data, Microsoft confirms

Unconfirmed reports also suggest data on threat hunting techniques, assessments of Russian threat actors, and source codes were also accessed
8 Oct 2021
How to become a cyber security expert
A cyber security professional at their desk in an office
Careers & training

How to become a cyber security expert

With cyber security professionals in high demand, we explore the steps people need to take to pursue a successful career in this industry
8 Oct 2021
The IT Pro Podcast: Behind the scenes of the Solarwinds hack
The IT Pro Podcast: Behind the scenes of the Solarwinds hack
cyber attacks

The IT Pro Podcast: Behind the scenes of the Solarwinds hack

We speak to the company’s top execs to find out what really happened
8 Oct 2021
Swimlane unveils its low-code security automation platform
A hand reaching out to a screen which displays automation options
automation

Swimlane unveils its low-code security automation platform

Swimlane Cloud is available as an on-premises, air-gapped, cloud, or hybrid solution
7 Oct 2021
The event mesh: A primer
Mesh/netting floating against a blue background whitepaper
Whitepaper

The event mesh: A primer

Benefits of an event-driven architecture
7 Oct 2021
Maverick fast-attack ransomware group FIN12 is quickly expanding
Ransomware message on a computer screen
ransomware

Maverick fast-attack ransomware group FIN12 is quickly expanding

FIN12 hits hospitals even during pandemic
7 Oct 2021
2021 Thales access management index: European edition
Two people working at a large table with papers and a colour swatch outwhitepaper
Whitepaper

2021 Thales access management index: European edition

The challenges of trusted access in a cloud-first world
7 Oct 2021
2021 Thales access management index: Global edition
Bird's eye view of a woman sitting on a circular couch looking at a laptop whitepaper
Whitepaper

2021 Thales access management index: Global edition

The challenges of trusted access in a cloud-first world
7 Oct 2021
What is HTTP error 503 and how do you fix it?
A graphic showing the HTTPS symbol
web browser

What is HTTP error 503 and how do you fix it?

It may not always be obvious what's causing the issue, but there are steps you can take to get back online
7 Oct 2021
Justice Department unveils civil cyber fraud initiative to battle online crime
Department of justice sign on a building
cyber attacks

Justice Department unveils civil cyber fraud initiative to battle online crime

New proposal will respond to cyber security breaches and cryptocurrency use in undertaking cyber fraud
7 Oct 2021
Twitch confirms data breach after server configuration error
The Twitch logo on a smartphone being held by a shadowy hand
data breaches

Twitch confirms data breach after server configuration error

The popular streaming service says there's no indication that login information has been exposed
7 Oct 2021
Why is the energy sector so vulnerable to hacking?
Power lines set against a city at night
cyber attacks

Why is the energy sector so vulnerable to hacking?

Highly-targeted energy companies often struggle to attract the right cyber security skills and rely on dated systems
7 Oct 2021