Key employment law updates | May 2025

Welcome to our monthly update, where we share upcoming changes to employment law. Employment Rights Bill: Second and Third Readings The House of Lords Committee Stage of the Employment Rights Bill (ERB) had its second and third sittings on 8 and 13 May 2025, addressing significant topics such as zero hours contracts and statutory sick […]

Read More →

Review: Metasploit, 2nd Edition

If you’ve spent any time in penetration testing, chances are you’ve crossed paths with Metasploit. The second edition of Metasploit tries to bring the book in line with how pentesters are using the tool. It mostly succeeds, with some caveats depending on your experience level and what you’re hoping to get out of it. About […]

Read More →

Tackling the rise of shadow AI: a guide for employers

This article dives into the pressing issue of unauthorised AI use by employees as the technology rapidly evolves and becomes easier to access. It discusses the inherent risks, including inaccuracies, cybersecurity threats, and possible data breaches that employers need to consider. The piece also offers guidance on establishing a solid AI framework to mitigate these […]

Read More →

Security awareness training isn’t stopping breaches. Can AI help?

Mick Leach, Field CISO at Abnormal AI, tackles the disappointing effectiveness of traditional security awareness training (SAT) in this enlightening video. Despite significant investments in SAT, human error—often the leading culprit in cybersecurity breaches—remains a persistent threat. Mick explores how integrating AI might just be the game-changer we need, offering a smarter and more personalised […]

Read More →

How Supply Chains Can Harness Public Data to Protect Against Cyber Threats

This article discusses how supply chains can leverage public data, specifically open-source intelligence (OSINT), to combat cyber threats. Insights derived from public data sources enable real-time risk detection, particularly crucial in contested logistics environments. Companies are advised to use OSINT strategically to enhance their cybersecurity initiatives. Source: SupplyChainBrain Key Points Open-source intelligence (OSINT) uses public […]

Read More →

Malware-as-a-Service (MaaS): An Emerging Cybersecurity Threat in the Supply Chain Industry

Malware-as-a-Service (MaaS) is radically changing the cybersecurity landscape, especially within the supply chain sector. It enables cybercriminals, armed with just a few hundred pounds, to launch sophisticated attacks without needing programming skills. This article highlights the accessibility and danger of MaaS, detailing how it poses an unprecedented threat to supply chain security. Source: Supply & […]

Read More →

Credential-Harvesting Blitz Puts Tinder, News Corp, Chick-fil-A on Alert

The hacking group known as “Scattered Spider” is causing a ruckus, targeting major companies like Tinder, News Corp, and Chick-fil-A. Their tactics include clever social engineering scams, where they impersonate company employees to extract sensitive information. They recently managed to breach the British retailer Marks & Spencer, severely impacting their operations and finances. With a […]

Read More →