AirPlay security flaws could help hackers spread malware on your network

Security researchers have uncovered vulnerabilities in Apple’s AirPlay that could enable hackers to infiltrate home networks and even exploit CarPlay systems. Key Points Vulnerabilities allow hackers to potentially take over AirPlay devices and spread malware across local networks. Two bugs identified are termed “wormable,” meaning they can self-replicate across connected devices. Attackers could execute remote […]

Read More →

Intelligent Waves’ (IW) Shadow, an Autonomous Pen-Testing Platform, Was Recognized as the 2025 Global InfoSec Awards’ Trailblazing Cyber Defense Solution of the Year

Intelligent Waves (IW), a top tech integrator, just bagged an award for their groundbreaking autonomous penetration testing platform, Shadow. This recognition highlights their commitment to upping the game in cybersecurity, especially in meeting the needs of government and enterprise clients. Shadow leads the way in continuous cyber defence, ensuring organisations stay ahead of potential threats. […]

Read More →

Cyber Security | UK Regulatory Outlook April 2025

Summary The UK government has set forth a new policy statement regarding the impending Cyber Security and Resilience Bill, which aims to enhance cybersecurity regulations across various sectors. Key measures include expanding the regulatory framework, enhancing oversight capabilities for regulators, and empowering the secretary of state with new directional powers. The recent Cyber Security Breaches […]

Read More →

CyberAegis teams win two CyberPatriot national titles

The CyberAegis teams have achieved remarkable success, clinching national titles in both the Middle School and Open Divisions of the CyberPatriot competition. Coach Paul Johnson expressed immense pride in his teams for their stellar teamwork and determination throughout the challenging season of cybersecurity challenges. The teams emerged victorious despite changes in their affiliations, with CyberAegis […]

Read More →

Resignation of the government: the impact on pending legislation

The recent resignation of the government after a failed motion of confidence has thrown various legislative processes into disarray, particularly affecting proposals related to cybersecurity, artificial intelligence, and data management. The President’s decision to dissolve Parliament means that these initiatives must be freshly proposed when the new parliamentary term begins. Source: Lexology Key Points The […]

Read More →

Researchers find numerous Apple AirPlay vulnerabilities allowing “wormable” exploits over Wi-Fi

Security researchers have uncovered a critical set of vulnerabilities in Apple’s AirPlay protocol that could allow attackers to remotely hijack devices without any user interaction. The exploit chain, known as “AirBorne,” consists of 23 individual bugs, including 17 that have official CVEs. This means that zero-click remote code execution is possible on vulnerable systems, putting […]

Read More →

Zero Trust everywhere: How MGM Resorts found agility and security with Zscaler

MGM Resorts has adopted a zero trust approach to improve security and agility in their operations. Collaborating with Zscaler, they have transformed their security architecture by eliminating implicit trust and rethinking branch configurations. This article discusses MGM’s practical implementation of zero trust and how it enhances both security and employee productivity. Source: CIO Key Points […]

Read More →