Incident response planning cuts the risk of claiming on cyber security insurance

Proper attention to incident response planning is emerging as a core cyber control when it comes to reducing the risk of having to claim on cyber security insurance, according... Read more »

Ransomware activity levelled off in July, says NCC

Ransomware levels held steady in the month of July, although the risk remained as persistent as ever Read more »

Three new Citrix NetScaler zero-days under active exploitation

Citrix patches three new vulnerabilities in its NetScaler lines warning of active zero-day exploitation by an undisclosed threat actor. Read more »

Okta makes AI identity play with Axiom acquisition

Okta says Axiom Security’s technology will reinforce its own offerings in privileged access management, especially when it comes to the growing number of non-human identities Read more »

Ransomware attack volumes up nearly three times on 2024

During the first six months of 2025, the number of observed and tracked ransomware attacks far outpaced the volume seen last year. Read more »

Moscow exploiting seven-year-old Cisco flaw, says FBI

US authorities warn of an uptick in state-sponsored exploitation of a seven-year-old vulnerability in Cisco’s operating system software. Read more »

Scale of MoD Afghan data breaches widens dramatically

Many more data breaches at the MoD’s Arap programme to relocate at-risk Afghan citizens to Britain have emerged following an FoI request by BBC journalists. Read more »

Apple iOS update fixes new iPhone zero-day flaw

Latest Apple zero-day found in the ImageIO framework opens the door for targeted zero-click attacks on iPhone users. Read more »

European digital sovereignty: Storage, surveillance concerns to overcome

As China and the US increase surveillance capabilities, are European companies caught in the middle of a data security storm? Read more »

Microsoft starts including PQC algorithms in cyber foundations

Microsoft updates on its post-quantum cyber strategy as it continues integrating quantum safe algorithms into some of the core foundations underpinning its products and services. Read more »
Subscribe to our Newsletter