Krispy Kreme Doughnut Cyber Attack might affect Christmas sales
Krispy Kreme, the renowned American multinational doughnut and coffee chain, recently became the target of a significant cyber attack that has disrupted a portion...
Black Hat Europe Recap: Auguria Debuts Newly Enhanced Platform
This year's Black Hat Europe showcased the latest advancements in research, developments and emerging trends in cybersecurity. Being surrounded by all of the innovative...
2025 Outlook: Turning Threats into Opportunities in a New Era of Innovation
As we step into 2025, the cybersecurity landscape is at a pivotal juncture. The challenges of AI-driven threats, evolving data privacy standards, relentless breaches,...
How the Cyber Grinch Stole Christmas: Safeguard Your Festive Season
The holiday season is a time for celebration, with organisations hosting festive parties and employees spending time with family. However, as teams focus on...
The three top cybersecurity predictions for 2025
The cyberthreat landscape has shifted rapidly over the past several years, and this evolution will continue in 2025. AI has become more powerful and...
How AI will both threaten and protect data in 2025
As we move into 2025, generative AI and other emerging technologies are reshaping how businesses operate, while at the same time giving them different...
Operation Power Off: International Effort Targets DDoS-for-Hire Networks
A global crackdown, known as Operation Power Off, has successfully disrupted over 27 major platforms that were facilitating Distributed Denial of Service (DDoS) attacks...
Proactive Threat Detection: The Role of Network Security
Network security is now an important part of keeping a company safe in this digital age where cyber threats are getting smarter. It is...
Cyber Threat from Chinese software powering critical infrastructure in USA
On one hand, policymakers in the United States, from local leaders to national figures, have voiced strong opposition to Chinese products, calling for sweeping...
Apple iOS devices are more vulnerable to phishing than Android
For years, there's been a widely held belief that iOS devices—such as iPhones—are virtually immune to phishing attacks, largely due to Apple’s strong emphasis...
MOST POPULAR
How healthcare cyber risk teams can plan ahead for HIPAA’s Security...
Enacted in 1996, the Health Insurance Portability and Accountability Act (HIPAA) has been the regulatory standard for U.S. healthcare providers, health organizations, and health...