UK Cybersecurity Weekly News Roundup – 31 March 2025

|
UK Cybersecurity Weekly News Roundup - 31 March 2025 Welcome to this week's edition of our cybersecurity news roundup, bringing you the latest developments and insights from the UK and beyond. UK Warned of Inadequate Readiness Against State-Backed Cyberattacks Cybersecurity experts have sounded the alarm over the UK's growing vulnerability ... Read More

UK Cybersecurity Weekly News Roundup – 23 March 2025

|
Welcome to this week's edition of our cybersecurity news roundup, bringing you the latest developments and insights from the UK and beyond. NHS Scotland Confirms Cyberattack Disruption On 20 March 2025, NHS Scotland reported a major cyber incident that caused network outages across multiple health boards. The cyberattack disrupted clinical ... Read More

UK Cybersecurity Weekly News Roundup – 16 March 2025

|
Welcome to this week's edition of our cybersecurity news roundup, bringing you the latest developments and insights from the UK and beyond. UK Government's Stance on Encryption Raises Global Concerns The UK government has ordered Apple to provide backdoor access to iCloud users' encrypted backups under the Investigatory Powers Act ... Read More

UK Cybersecurity Weekly News Roundup – 9 March 2025

|
Welcome to this week's edition of our cybersecurity news roundup, bringing you the latest developments and insights from the UK and beyond.Microsoft Engineer's Transition to Cybersecurity Ankit Masrani, a 36-year-old software engineer, successfully transitioned into a cybersecurity role at Microsoft. With a background in IT and a Master's degree in ... Read More

UK Cybersecurity Weekly News Roundup – 2 March 2025

|
UK Government's Encryption Demands Lead to Apple's Data Protection Withdrawal The UK government has mandated that Apple provide access to encrypted iCloud backups under the Investigatory Powers Act of 2016. In response, Apple has withdrawn its "Advanced Data Protection" feature for UK users, citing concerns over user privacy and security ... Read More

UK Cybersecurity Weekly News Roundup – 24 February 2025

|
Welcome to this week's edition of our cybersecurity news roundup, bringing you the latest developments and insights from the UK and beyond. Home Office Contractor's Data Collection Sparks Privacy Concerns The Home Office faces scrutiny after revelations that its contractor, Equifax, collected data on British citizens while conducting financial checks ... Read More
Google Big Sleep AI LLM security vulnerability

Best of 2021 – The Linux Flaw you can’t afford to Ignore (CVE-2021-3156)

Linux and Unix operating systems require regular patching like any IT system, but as security professionals, ethical hackers, and criminal hackers will tell you, regular Linux and Unix patching is often neglected.CVE-2021-3156 sudo VulnerabilityLast week (26th January 2021) a new critical rated Linux\Unix vulnerability was made public under CVE-2021-3156. Specifically, the ... Read More
Prevention is Better Than Cure: The Ransomware Evolution

Prevention is Better Than Cure: The Ransomware Evolution

Ransomware tactics have continued to evolve over the years, and remain a prominent threat to both SMBs and larger organisations. Particularly during the peak of COVID-19, research by IBM found that ransomware incidents ‘exploded’ in June 2020, which saw twice as many ransomware attacks as the month prior, taking advantage of remote ... Read More
How Businesses Can Utilise Penetration Testing

How Businesses Can Utilise Penetration Testing

Understand your security vulnerabilitiesArticle by Beau PetersThe basic approaches like phishing simulations are good, but they tend to have limited reach. This is why more agile methods, penetration testing among them, have been getting increasing attention. In essence, this sees experts with a background in ethical hacking utilizing the techniques of cybercriminals ... Read More
Payment Security: Understanding the Four Corner Model

Payment Security: Understanding the Four Corner Model

Introduction Online shopping digital payment transactions may seem quite simple, but in reality, just one single transaction sets off multiple, long-chain reactions. The Payment Card Industry comprises debit cards, credit cards, prepaid, e-purse/e-wallet, and POS payment transactions that enable easy payment transactions for consumers. However, the card scheme is a ... Read More