Outlaw cybergang attacking targets worldwide

In a fresh wave of cyber threats, Kaspersky has uncovered the Outlaw cybergang, a Perl-based crypto mining botnet known for exploiting weak Linux SSH credentials. This article dives into a specific incident in Brazil, revealing how this menace operates and shares vital telemetry data regarding the regions most affected. Source: Cyber Security Review Key Points […]

Read More →

Forescout reports rise of state-sponsored hacktivism, as geopolitics rewrites cyber threat landscape

In their latest report, Forescout Technologies Inc. dives deep into the growing trend of state-sponsored hacktivism, examining 780 attacks attributed to various groups amid ongoing geopolitical tensions. Critical infrastructure remains in the crosshairs, with cyber operations morphing into vital tools for national interests. The study indicates a shift from grassroots activism to strategic cyber warfare, […]

Read More →

UK: Will UK cyber reforms keep step with NIS2?

The article discusses the anticipated Cyber Security and Resilience Bill (CS&R Bill) in the UK and its alignment with Europe’s NIS2 directive. With growing pressure for reform and updates in cyber regulations across Europe, the UK’s approach looks to expand the scope of regulatory compliance for various sectors. The Secretary of State has hinted at […]

Read More →

Designing Tomorrow’s Workforce Today

In today’s rapidly evolving business landscape, the need for Strategic Workforce Planning (SWP) has never been more critical. As companies navigate technological advancements and sustainability challenges, the question of whether they possess the necessary skills to realise future strategies has become mandatory in every boardroom discussion. Key Points SWP is essential for aligning workforce capabilities […]

Read More →

Innovation Law Insights: 23 April 2025

In this edition of Innovation Law Insights, we dive deep into the latest legal developments affecting technology and cybersecurity in Italy and beyond. Recent resolutions from the Italian National Cybersecurity Agency, insights from industry leaders in gambling, and ongoing legislative efforts in response to AI technologies take centre stage. NIS2 – The Countdown to Compliance […]

Read More →

Evolutions in Hacking with Marco Ivaldi

In this episode of The BlueHat Podcast, Marco Ivaldi, co-founder of HN Security, shares his extensive journey from a teenage hacker in the 1980s to a respected figure in the cybersecurity field. He provides insights into ongoing challenges in cybersecurity, particularly focusing on Active Directory and password security. Marco discusses his experiences with Microsoft’s Zero […]

Read More →

What is a CIO (chief information officer), and what do they do?

Summary A Chief Information Officer (CIO) is a senior executive responsible for steering an organisation’s IT strategy, digital transformation, and tech-driven business growth. They ensure technology initiatives are in line with business objectives and oversee areas such as hardware, software, cybersecurity, and data management. The role of the CIO has evolved significantly since its inception […]

Read More →