Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Olympus suffers a suspected BlackMatter ransomware attack
CPO Magazine
A second MoD data breach endangers lives of 55 Afghan individuals
ProPrivacy
What exactly is security awareness strategy?
Did you know that most cyber breaches occur due to human error? That’s because most people aren’t aware of the cyber security threats that put themselves and their organisations at risk! Without basic security awareness, we're more likely to click on phishing links or...
The five most important ransomware attacks of 2021
Raconteur
The Digital Pandemic – Ransomware
Security Boulevard
Perceived vulnerability as a determinant of increased risk for cyber security risk behavior
There is interest in better understanding people's cybersecurity (CS)-related attitudes and behaviors, which are ultimately impacted by their perceived vulnerability to CS risks. This study sought to examine the information security attitudes and behaviors that...
Apple urgently patches exploits across several operating systems
Channel Life
Why language matters in cybersecurity
Language is at the heart of communication. Every time we speak or write, we choose language appropriate to our audience to get our desired message across. Why should it be any different in cybersecurity? Yet, the cybersecurity industry has a problem. Too often,...
Olympus likely victim of BlackMatter ransomware attack
Computer Weekly
Applying behavioural science to cybersecurity
Tech Monitor
Passive and active training approaches for critical infrastructure protection
In order to strengthen Critical Infrastructure's protection and resilience, it is central to invest in training and simulations, to spread a security culture and develop the awareness among all personnel involved in the Critical Infrastructure security. Nowadays,...
COVID-19 and phishing: Effects of human emotions, behavior, and demographics on the success of phishing attempts during the pandemic
Phishing is an online scam where criminals trick users with various strategies, with the goal of obtaining sensitive information or compromising accounts, systems, and/or other personal or organisational Information Technology resources. Multiple studies have shown...
Week in review: ProxyShell and Realtek SDK vulnerabilities exploitation, automated pentesting
Help Net Security
Locked the car, why not the computer: A qualitative and quantitative study on data safety compliance
Information technology has become an integral part of healthcare within the United Kingdom's National Health Service (NHS). All healthcare professionals are required to possess a certain level of computer knowledge and adhere to cyber ethics standards, which are...
22% of cybersecurity incidents in H1 2021 were ransomware attacks
Help Net Security
Hackers targeting vulnerable UK government and police servers
Information Age
Half of MS Exchange servers at risk in ProxyShell debacle
Computer Weekly
Hackers target Microsoft email sever vulnerabilities
Security Brief NZ
Ransomware attacks doubled in frequency during pandemic
ITProPortal
Ransomware attacks on UK organisations have doubled in the first half of 2021
Computing
Ransomware attacks are now the second most commonly reported security incident
BetaNews