Read about a supply chain attack that involves XZ Utils, a data compressor widely used in Linux systems, and learn how to protect from this threat.
Read about a supply chain attack that involves XZ Utils, a data compressor widely used in Linux systems, and learn how to protect from this threat.
From generative AI and virtual prototyping to the Internet of Things, blockchain and data analytics, Merkle has predicted that four shifts in the business-to-business market will shape tech buying appetites.
Discover what industry experts think the events of Q1 mean for the business cyber security landscape in the UK.
DNS FireWall is an intuitive security app built to protect you and your business from malware, phishing, botnets and more security threats.
Microsoft has called on UK business leaders to “fight fire with fire” by adopting AI cybersecurity tools to defend themselves from cyberattacks.
The GoFetch vulnerability, which affects Apple’s M series of chips, allows an attacker to steal secret keys from the Mac under certain conditions. Read tips on mitigating the GoFetch security threat.
Risky cyber security behaviours are putting employees at risk of phishing and other attacks, according to Proofpoint research, with many employees still unclear security is their responsibility, too.
Security Onion 2.4.60 is now available! It includes some new features for our fellow defenders and lots of bug fixes! […]
The OWASP Mobile Application Security Verification Standard (MASVS) version 2.1.0 was released in January 2024, containing new, updated, merged, and re-prioritized threat categories. The changes better reflect the current cyber threat landscape, giving mobile developers a stronger advantage in securing apps across platforms.
Burnout and fatigue among cyber professionals are leading to flow-on consequences like more data breaches, employee apathy to cyber duties and turnover of cyber workforces during a skills crisis.