Mostly positive results from Netflix, as streaming giant winds down legacy DVD via post program and expands password crackdown
News Security
Why technologists need to adopt an integrated approach to application security
Across all sectors, it has become an increasingly complex challenge to manage application security, particularly in recent years. Digitization and innovation have led to considerable expansions in attack surfaces, especially in instanc ...
Public sector IT teams urged to embrace new application security strategies amid growing attack surfaces.
Application security must catch up with the attack surface expansion, which is now a significant problem for many organizations. To guard against this, organizations in the public sector have ramped up their digital transformation prog ...
WhatsApp, Other Messaging Firms Urge Online Safety Bill ‘Rethink’
WhatsApp, six other encrypted messaging firms call for 'urgent rethink' of Online Safety Bill that they say woud weaken user security
Ransomware Hackers Steal Sensitive Charity Data
Londonderry-based IT firm Evide says personal data from charity clients stolen following ransomware attack as organisations warn of fraud risk
Silicon UK In Focus Podcast: Privacy-Preserving Machine Learning
Often machine learning models don’t have all the information they need to deliver effective insights. In the security space in particular, it’s now possible to build machine learning models that have sensitive information included in t ...
Humans Needed To Avoid Cybersecurity Missteps, Gartner Says
Gartner identifies top cybersecurity trends for 2023, and says organisations need to adopt a human-centric focus to avoid cyber failures
OpenAI To Offer Bug Bounties Up To $20,000
Bug bounty program introduced by OpenAI, to track down and eliminate vulnerabilities, bugs, or security flaws
Quest Software Podcast: The Democratisation of Data: Episode 2: Legacy Technology – A Burden and a Vulnerability?
In this episode, we are considering Legacy technology and whether this is a burden and vulnerability in building a data-driven enterprise.
How Secure are Composable Architectures?
As composable architectures continue to expand and influence the future of e-commerce, is the security of these technologies being fully considered? Is composable intrinsically more secure than the monolith?
Spyware Used Across 10 Countries, Says Citizen Lab, Microsoft
Journalists, opposition figures and advocacy groups across at least 10 countries hacked by Israeli spyware, research alleges
Sophos Study Finds Most Firms Struggle To Execute Essential Security Tasks
State of cybersecurity report for 2023 from Sophos reveals that majority of businesses find essential security tasks challenging
UK’s National Cyber Force Outlines ‘Responsible’ Cyber Operations
Agency that carries out offensive cyber operations for the UK, reveals it is engaged against Russian, Chinese and other nation-state hackers
Genesis Market Takedown Sees 120 Suspects Arrested
Largest online marketplace selling stolen credentials to criminals worldwide has been taken down in international operation
Leaked Vulkan Files Reveal Kremlin’s Cyberwarfare Tactics
Explosive documents leaked by whistleblower in protest of Kremlin's war in Ukraine, shine a light on Russia's cyberwarfare operations
Staying Safe in Our New AI World: How Organisations Can Protect Themselves
The advent of AI models such as ChatGPT and more recently GPT-4 has been a game-changer for communication and information exchange across entire industries – automating time-consuming tasks and increasing the speed of interactions with ...
The Risk and Reward of ChatGPT in Cybersecurity
Unless you’ve been on a retreat in some far-flung location with no internet access for the past few months, chances are you’re well aware of how much hype and fear there’s been around ChatGPT, the artificial intelligence (AI) chatbot d ...
Twitter Says Source Code Posted Online
Twitter takes legal action to take down 'stolen' source code posted on GitHub and identify who uploaded it, amidst ongoing turmoil
Terra Co-Founder Do Kwon Arrested In Montenegro
Interpol confirms Do Kwon arrested after six months on the run, after spectacular demise of TerraUSD cryptocurrency
Government Launches NHS Cyber Security Strategy
NHS commitment. Government launches seven year cyber security strategy for the health and adult social care sectors
Crypto Investment ‘Scam’ Defrauds Thousands Of Users
Crypto trading app iEarn Bot appears to be massive scam drawing in thousands of investors in multiple countries, report finds
TikTok Banned From UK Government Phones
Cabinet Office minister Oliver Dowden confirms TikTok is to be banned on government phones over links to China
UK Mulls TikTok Ban On Government Devices
China's TikTok is being reviewed by NCSC, with Prime Minister Rishi Sunak hinting UK could follow governmental bans by other nations
Hackers Steal $199m From UK Crypto Start-Up Euler Labs
Hackers steal nearly $200m from UK crypto lender Euler Labs, amidst rampant hacking and business failures in crypto sector
NatWest Adds Crypto Limits As Scams Proliferate
NatWest caps transfers to crypto exchanges as consumers and businesses lose hundreds of millions to elaborate scams
WhatsApp Will Not Comply With UK Online Safety Bill
WhatApp becomes second major platform to indicate it will not comply with the UK's revised Online Safety Bill
Acer Confirms Huge 160GB Data Breach
Taiwanese PC giant Acer confirms major data breach, with hacker stealing 160GB of sensitive data and hawking it for sale
Appointments Cancelled After Ransomware Attack On Barcelona Hospital
Cyberattack on major hospital in Spanish city of Barcelona has resulted in cancellation of thousands of appointments
Germany To Ban Huawei, ZTE From 5G Networks – Report
Years of dithering by German officials may soon end, amid report the country is preparing to ban Huawei, ZTE from 5G networks
Hackers Begin Publishing Data Of Oakland City Workers
After a ransomware attack last month on the city of Oakland in California, hackers have begun leaking stolen data online