Stuart spoke to Morgan Reed at NNT regarding the current state of the PCI DSS and what the future holds…
Browsing: Malware and Vulnerabilities
In light of Critical Infrastructure Security and Resilience Month and with the threat of a cyber attack against Critical National Infrastructures (CNI)…
Unfortunately, many organisations see Software Asset Management (SAM) as a compliance reporting tool and little else. This is in some…
In light of today’s news on the Jewson cyberattack, Niall MacLeod, Enterprise Solutions Architect EMEA at Anomali commented below. Niall MacLeod, Enterprise…
Check Point adds new capabilities to SandBlast Mobile Solution in response to increased mobile cyber threats: survey of over 850 firms globally…
Cisco Systems has discovered a critical vulnerability is its Cisco Voice Operating System software that allows an unauthenticated, remote hacker…
Avast have uncovered a new mobile banking trojan in some Google Play apps which has been stealing the banking details of users. As an…
Manoj Asnani, VP Product and Design at Balbix: “Terdot uses two attack vectors to exploit users – phishing and Man-in-the-middle.…
News has just surfaced that Cash Converters has been hit by a data breach. The company reported that it had: “Received an email threat…
Ransomware attack trends will split based on motives Ransomware as a disruptive or destructive attack will increase. Cyber warcraft is…