What the UK Can Learn from the US Colonial Pipeline Attack

Critical National Infrastructure is the backbone of the UK. Our quality of life as a nation depends on the prosperity of our NHS, the reliability of our electricity, water, and gas systems, and the ability of our emergency services to react with lightning speed when called upon. When compromised, it’s not just our economy that’s […]

Modeling Consumer Trends with Large-Scale Scraping

There exists a classic example explaining the Modern Portfolio Theory (MPT) in finance. It goes thus: there are only two businesses on a small island, one selling umbrellas and the other sunglasses. On that island there are always, on average, 6 months of dry and wet season with profits of both companies depending on the […]

WhatsApp Scam That Hijacks Account Resurfaces

BACKGROUND: It has been reported that multiple police forces in the UK are warning WhatsApp users about scammers that could hijack their accounts. The scam involves security codes and has existed for a while but is rearing its head again. The old scam involves a message that’s seemingly from your friend. A usually hacker poses as a […]

Experts Reaction On Linkedin Breach Reportedly Exposes Data Of 92% Of Users

BACKGROUND: As reported by 9to5mac a second massive Linkedin breach reportedly exposes the data of 700M users, which is more than 92% of the total 756M users. “The database is for sale on the dark web, with records including phone numbers, physical addresses, geolocation data, and inferred salaries. The hacker who obtained the data has […]

Three Years of GDPR: Has it Delivered on Its Promise?

In this data-driven world, culpability and legislation are crucial. More crucial, and not to be overlooked, however, is that they fulfill their purpose – improving overall data privacy and security. As of May 2021, three years have passed since the inception of GDPR, Europe’s data privacy, and security law. Despite the flurry of activity that […]

How Has Ransomware Grown In The Last Few Years?

There has been a jump in ransomware since the pandemic began and many businesses have either suffered from an attack themselves or know someone in their supply chain who has become a ransomware victim. Ransomware-as-a-Service is also a fast-emerging threat so we spoke to Sean Tickle, Head of CyberGuard Technologies, to learn whether companies should pay the demand […]

Cyber-Commentary: Microsoft Warns of Continued Attacks by the Nobelium Hacking Group

Microsoft Azure Marketplace

The Microsoft Threat Intelligence Center said it’s been tracking recent activity from Nobelium, a Russia-based hacking group best known for the SolarWinds cyberattack of December 2020, and that the group managed to use information gleaned from a Microsoft worker’s device in attacks. Microsoft said it “detected information-stealing malware on a machine belonging to one of […]

5 Tips for Avoiding Your Security Program Pitfalls

Conceptualizing, developing, implementing, and maintaining an effective security program is a critical necessity for organizations to successfully achieve compliance with internal and regulatory controls. An effective security program is also paramount in an organization’s ability to meet contractual requirements with customers. Once initial compliance is achieved for the adopted, in-scope controls, the perpetual focus should […]