- — NCSC: Russia’s Fancy Bear targeting logistics, tech orgs
- The NCSC and its partner agencies have blown the whistle on an extensive campaign of malicious cyber attacks orchestrated by the Russian state Fancy Bear operation.
- — Podcast: RSA 2025 – AI’s risk surface and the role of the CISO
- We review RSA 2025 with Vigitrust CEO Mathieu Gorge who looks at the impacts on compliance of AI’s expanding risk surface, the role of the CISO, and a changed supplier approach
- — Capital One pushes out data tokenisation
- Organisations using the Databricks and Snowflake platforms will be able to use Capital One’s Databolt tool to secure their data
- — Strong fintech security posture at risk via third-party weak links
- Despite having a strong security posture, the financial technology sector could be open to attack via third parties
- — Ransomware attacks dropped by a third last month
- Reported ransomware attacks eased off during April following a dramatic spike in the first quarter of 2025
- — How to create a remote access policy, with template
- Remote work, while beneficial, presents numerous security risks. Help keep your organization's systems safe with a remote access policy.
- — Hacking contest exposes VMware security
- In what has been described as a historical first, hackers in Berlin have been able to demo successful attacks on the ESXi hypervisor
- — Retail cyber attacks hit food distributor Peter Green Chilled
- Cold chain services provider Peter Green Chilled, which supplies the likes of Aldi, Sainsbury’s and Tesco, has been forced to halt operations after succumbing to a ransomware attack
- — Chinese cyber spooks lure laid-off US government workers
- A Washington DC-based think tank has published evidence that Chinese intelligence services have been running a network of digital ‘front’ companies targeting laid-off government workers as recruits
- — Legal Aid Agency breach may encompass millions of people
- Legal Aid Agency says the data of anybody who applied for legal aid over the past 15 years has been compromised in a cyber attack
- — What is a firewall and why do I need one?
- A firewall is a network security device that prevents unauthorized access to a network by inspecting incoming and outgoing traffic using a set of predetermined security rules.
- — What is Universal 2nd Factor (U2F)?
- Universal 2nd Factor (U2F) is a physical device that can act as a form of authentication for an account.
- — Jump in cyber attacks should put businesses on high alert
- Three principles to help businesses get on top of cyber security
- — No workaround leads to more pain for VMware users
- There are patches for the latest batch of security alerts from Broadcom, but VMware users on perpetual licences may not have access
- — Security tests reveal serious vulnerability in government’s One Login digital ID system
- A ‘red teaming’ exercise to simulate cyber attacks on the government’s flagship digital identity system has found that One Login can be compromised without detection
- — How digital identity will empower people and drive economic growth
- The government has finally plotted out the future of digital identity in the UK in a way that makes sense for private sector, public sector, and citizens. Now let's make it happen
- — The Security Interviews: David Faugno, 1Password
- David Faugno, co-CEO of 1Password, discusses how his background led to him joining the company and why maintaining profitability is a key factor in overcoming the challenges of switching markets.
- — NHS asks suppliers to sign up to cyber covenant
- NHS digital and security leaders call on their suppliers to commit to a cyber security charter as the health service works to improve its resilience in the face of growing threat levels
- — How close is quantum computing to commercial reality?
- At a recent event, experts explored the progress towards logical qubits and how these will be applied to empower business IT
- — Scattered Spider retail attacks spreading to US, says Google
- Google’s threat intel analysts are aware of a number of in-progress cyber attacks against US retailers linked to the same Scattered Spider gang that supposedly attacked M&S and Co-op in the UK
- — Enisa launches European vulnerability database
- The EU’s new vulnerability database is designed to offer a broader, more transparent source of information on new cyber vulnerabilities
As of 5/21/25 11:15am. Last new 5/21/25 9:26am.
- Next feed in category: TMC