Category: Information Security Buzz

Credential-stealing malware surges in 2024

Malware designed to steal credentials from password stores now accounts for 25% of all malware activity—a dramatic threefold increase in this type of threat.  This was one of the findings of Picus Security’s annual cybersecurity analysis, The Red Report 2025.…

2024: The Year Data Security Took a Beating

2024 was a brutal year for data security, with some of the world’s biggest companies suffering breaches that exposed millions of sensitive records.   The attacks were carried out by well-known cybercriminal groups, including Alphv/BlackCat, Qilin, and Rhysida, and shone a…

Upskilling the UK workforce for the AI revolution

As the UK government rolls out its ambitious AI Opportunity Action Plan to enable greater implementation of new technologies to boost economic growth, it faces a critical challenge: ensuring every industry is prepared for this seismic shift.  Interestingly, both UK…

Smiths Group Discloses Security Breach

Smiths Group, a multinational engineering business, has disclosed a data breach. The company, which is based in London but employees more than 15,000 people in over 50 countries, published a filing to the London Stock Exchange (LSE) on Tuesday saying…

What is Acceptable Risk?

CISOs today must decide what is an acceptable risk to their organization. It’s an impossible equation to solve as enterprise attack surfaces are rapidly expanding, necessitating the need for a modernized approach to risk assessment. The most forward-thinking CISOs use…

Criminals Increase Attack Speed by 22%

The average time it takes for an attacker to move laterally after gaining initial access – known as breakout time – has plummeted to just 48 minutes, new research from ReliaQuest has revealed.   These results represent a 2% increase in…

Cyberattack Crashes the Party Amid DeepSeek’s Meteoric Rise

Chinese artificial intelligence (AI) startup DeepSeek, which has taken the market by storm, has temporarily limited new user registrations following a large-scale cyberattack that disrupted its services.   According to Reuters, the attack coincided with the company’s AI assistant becoming the…

Attackers Exploit PDFs in Sophisticated Mishing Attack

In a newly discovered phishing campaign, malicious actors are using malicious PDF files to target mobile device users in potentially more than 50 countries.   Dubbed the “PDF Mishing Attack,” the campaign exploits the widespread trust in PDFs as a secure…

GoDaddy’s Cybersecurity Called into Question

The Federal Trade Commission (FTC) has filed a complaint that GoDaddy has violated Section 5 of the FTC Act pertaining to “unfair methods of competition” through “unfair or deceptive acts or practices.” The complaint details how GoDaddy’s failure to implement…

A Strategic Approach to Container Security

Containerization technologies have transformed how applications are built, deployed, and managed. From speeding up production cycles to enabling seamless scalability, they have become the backbone of mission-critical enterprise applications. Gartner predicts that by 2027, 90% of global organizations will run…