Identity-based attacks have taken centre stage as the top cybersecurity concern for organisations in the coming year, according to a new survey conducted by Keeper Security at Infosecurity Europe 2025. The leading cybersecurity provider of zero-trust and zero-knowledge Privileged Access…
Tag: IT SECURITY GURU
CREST introduces a staged pathway for advancement to globally-recognised CREST cybersecurity accreditation
The CREST Pathway and Pathway+ options make cybersecurity accreditation accessible to all organisations that aspire to provide cybersecurity services at the highest levels of quality but would benefit from additional resources and guidance to reach their goal. International cybersecurity not-for-profit,…
Forescout Vedere Labs shows “vibe hacking” isn’t quite the threat it’s made out to be… yet
Forescout’s Vedere Labs has published new research examining the real-world threat posed by generative AI in cyberattacks. While public concern is growing around “vibe hacking“, a term describing AI-driven, autonomous hacking, the research findings suggest the threat remains in its…
MSPs Under More Scrutiny From Customers on Cyber Than Ever
New research by Cybersmart has revealed that over half (58%) of MSP leaders globally believe their customers are at more risk today than this time last year. As a result, MSPs are being relied upon more than ever by customers…
Huntress and Microsoft Collaborate to Strengthen Cybersecurity for Businesses Worldwide
Huntress has announced a new collaboration with Microsoft aimed at enhancing cybersecurity for businesses of all sizes. As cyberattacks grow increasingly sophisticated, this partnership seeks to equip organisations, especially those with limited resources and in-house expertise, with the tools and…
How to Secure Your Promo Codes Against Cyber Exploits
Promo codes provide a fantastic opportunity to increase customer traffic and generate sales, yet there is a potential risk with them. Promo codes are one of the objects of interest to cybercriminals because they exploit those codes and use them…
Empowered employees strengthen financial sector digital resilience
Ensuring that any organisation can withstand, respond effectively to and recover quickly from ICT disruptions is a strategic imperative. This is particularly true within the financial sector. The Digital Operational Resilience Act (DORA), which became mandatory on 17 January this…
Trust nothing, verify everything: Why the UK public sector must embrace Zero Trust
The UK’s public sector is under siege. Not by visible enemies, but by a wave of cyber threats. In 2024, the National Cyber Security Centre reported a 16% increase in serious attacks impacting national security. These aren’t theoretical risks. They…
Black Duck Sets New Standard with Polaris, First AppSec SaaS Hosted in Saudi Arabia
Leading global application security provider Black Duck has reinforced its commitment to the Saudi Arabian market with the introduction of the Black Duck Polaris® Platform as the first application security software as a service (SaaS) platform hosted in the Kingdom of…
Infinity Global Services’ Pen Testing Achieves CREST-Accreditation
With today’s unpredictable cyber threat landscape, proactive security measures are crucial. Infinity Global Services (IGS) offers penetration testing (PT), a vital service that uncovers vulnerabilities before exploitation. Delivered by a team of seasoned experts, IGS’s penetration testing service has now…
How Betting Sites Keep Your Information Safe (Without You Even Noticing)
Ever wondered what’s going on behind the scenes when you place a bet online? No, not the odds or the algorithms that somehow know your team’s about to blow a 2–0 lead again – we’re talking about the security side…
Defining Cyber Resilience: Industry Leaders Meet in London as AI Threats Accelerate
Last week, Check Point hosted its annual Cyber Leader Summit at Landing Forty-Two in London’s iconic Leadenhall Building. The summit convened influential figures from the cybersecurity, law enforcement, and enterprise communities to explore the rapidly evolving threat landscape and the…
Bridewell report indicates rise in lone wolf ransomware actors
Bridewell, a UK-based cybersecurity services company, has released its latest CTI Annual Report – a comprehensive deep dive into ransomware trends. It highlighted a significant shift in attack strategies, payment dynamics and threat actor behaviours, revealing that data theft and…
Black Duck Teams with Arm to Boost EU Cyber Resilience Act Compliance
Software security company Black Duck is ramping up efforts to help organizations comply with the European Cyber Resilience Act (CRA), building on a 20-year partnership with British chip design giant Arm. The collaboration focuses on securing software running on Arm64-based…
Keeper Security Achieves SOC 3 Compliance
Keeper Security has achieved System and Organisation Controls (SOC) 3® compliance, demonstrating the company’s commitment to the highest standards of security for all users. The SOC 3 report, governed by the American Institute of Certified Public Accountants (AICPA), is a…
Over Two Thirds of MSPs Hit by Multiple Breaches in Past Year, Survey Reveals
Today, Cybersmart, a provider of cyber risk management for small businesses, has released the findings from its second annual CyberSmart MSP Survey, which focuses on the security of Managed Service Providers (MSPs) and their customers. The 2025 report revealed that 69%…
US States with Notable Consumer Data Privacy Laws
Privacy issues have garnered significant attention from the state despite not typically being at the forefront of discussions regarding data regulation. The states included in the article are not in any specific sequence. Kentucky Steps Up Early Sectors like entertainment…
Top 5 AI SOC Analyst Platforms to Watch out for in 2025
As threats evolve in sophistication and frequency while cyber skills gaps persist, Security Operations Centres (SOCs) are increasingly turning to AI-driven platforms to enhance threat detection, streamline investigations, and automate responses. But which one is the best? Prophet Security (Best…
Unusual Toolset Behind Fog Ransomware Prompts Fresh Security Concerns
A newly discovered ransomware operation dubbed Fog is raising fresh concerns in the cybersecurity community after researchers found it leveraging a highly unusual mix of legitimate business software and open-source offensive security tools. The campaign, observed in June 2025, is…
Industry Veterans and New Talent Recognised at European Cybersecurity Blogger Awards 2025
The winners of the European Cybersecurity Blogger Awards were announced at a ceremony held at Novotel ExCeL, as part of Pulse Conference’s Cyber 100 event on the 4th June 2025. The awards celebrated the industry’s best blogs, podcasts and vlogs,…