Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Supporting Victims and Empowering Recovery - CyberAwareness Month 2024

As the digital world continues to grow, so do the threats within it. Cybercrime is no longer just an online inconvenience—it’s a serious issue affecting real lives, families, and communities. In recognition of Cyber Awareness Month this October, The Cyber Helpline is launching a crucial campaign to raise £50,000 to expand and enhance our vital services for victims of online harm.

More security visibility for 1Password Teams accounts with new reporting trial

It’s no secret that it’s hard to protect against what you can’t see. One of the biggest challenges facing security and IT experts is visibility into whether their team is following business security best practice – and this is especially true for small businesses.

Don't Put Real Answers Into Your Password Reset Questions

This recent article on how a hacker used genealogy websites to help better guess victims' password reset answers made it a great time to share a suggestion: Don’t answer password reset questions with real answers! It’s not Jeopardy! You don’t have to answer the questions correctly. In fact, you’re putting yourself at increased risk if you do. Instead, give a false question to any required password reset answer.

Cybercriminal Gang Targeting SMBs Using Business Email Compromise

Researchers at Todyl have published a report on a major cybercriminal group that’s conducting business email compromise (BEC) attacks against small and medium-sized businesses. Todyl describes three separate BEC attacks launched by this threat actor. In one case, the attackers compromised a Microsoft 365 account belonging to an individual working at a small non-profit.

CrowdStrike Named a Leader in the 2024 Forrester Wave: Attack Surface Management Solutions

CrowdStrike is proud to be named a Leader in The Forrester Wave: Attack Surface Management Solutions, Q3 2024. Our position as a Leader reinforces our belief that the rapid expansion of modern attack surfaces requires a powerful, unified solution — and CrowdStrike Falcon Exposure Management provides the critical capabilities modern organizations need.

3 Tips You'll Want to Know Before Purchasing Your Endpoint Security

Choosing the right solution to protect endpoints is more important than ever in an environment where corporate cybersecurity attacks are more pervasive, sophisticated, and evasive than ever. Over the past decade, endpoint security has evolved from specific products to multi-functional platforms that not only prevent attacks, but also offer response and recovery capabilities.

Kubernetes Namespace Restriction and Separation

Teleport provides a secure and scalable solution for managing namespace separation in Kubernetes clusters, streamlining compliance, and enabling financial institutions to maintain both resiliency and agility. Kubernetes has rapidly evolved from a tech buzzword to an indispensable backbone of modern infrastructure in the financial services industry — redefining how institutions scale, secure, and deliver their most critical applications.

Weekly Cyber Security News 03/10/2024

Let’s catch up on the more interesting vulnerability disclosures and cyber security news gathered from articles across the web this week. This is what we have been reading about on our coffee break! Ouch! Now this is an incredible revelation and I ‘doff my hat to them: Using the word ‘hallucinations’ is so funny, yeah, I’ve seen some really weird things AI comes up with that I question what has the machine been taking.

Millions of Kia Vehicles Exposed to Remote Hacks via License Plate: The Growing Risk of Automotive API Vulnerabilities

In an increasingly connected world, the lines between digital security and physical safety are rapidly blurring. The automotive industry, now more reliant on connectivity than ever before, faces a new wave of cybersecurity threats. Millions of Kia vehicles, ranging from the 2013 model year to 2025, were recently found to be vulnerable to remote hacking via license plate information.