Hacking Group Linked to Vegas Disruptions Suspected in Recent UK Retail Attacks

A hacking group known as Scattered Spider, which previously caused significant disruption on the Las Vegas Strip, is suspected of being behind recent cyber intrusions targeting U.K. retailers, according to reporting by The Wall Street Journal (WSJ). London department store Harrods, along with retailers Marks & Spencer and Co-op, have reported cyber incidents in the […]

Read More →

How Collaboration Between Public and Private Sectors Accelerates Vulnerability Remediation

This article dives into how teaming up between public and private sectors can speed up the remediation of cybersecurity vulnerabilities. It covers the importance of rapid information sharing, coordinated responses, and the pooling of resources to combat security threats effectively. Source: Article URL Key Points Collaboration enables faster identification and remediation of vulnerabilities. Shared threat […]

Read More →

Why Zero Trust architecture is superior to traditional security models

The modern threat landscape is a minefield of sophisticated cyberattacks, with ransomware incidents soaring and traditional security models falling short. This article discusses why shifting to a Zero Trust architecture is essential for organisations aiming to safeguard their operations from such evolving risks. Key Points Ransomware incidents grew by 18% in 2024, highlighting the urgency […]

Read More →

Avast antivirus-owner Gen Digital forecasts upbeat 2026 on strong demand

Summary Gen Digital, the company behind popular antivirus software like Avast, Avira, and Norton, has projected a strong performance for 2026, expecting annual revenue and profit to exceed analyst estimates due to heightened demand for cybersecurity tools. Following this announcement, shares surged by about 4%. The increasing frequency of cyberattacks and online scams has driven […]

Read More →

Tulsi Gabbard Reused the Same Weak Password on Multiple Accounts for Years

Tulsi Gabbard, now the US director of national intelligence, has come under scrutiny after it was revealed that she reused a weak password across multiple personal accounts for years. Leaked records highlight her failure to follow basic cybersecurity protocols, raising concerns about the security of sensitive information she had access to during her congressional tenure. […]

Read More →

Those scam crypto texts are coming from the Karen National Army and a Myanmar warlord

The U.S. Treasury has announced sanctions against a Myanmar warlord, Saw Chit Thu, whose militia, the Karen National Army, is implicated in orchestrating widespread scam texts that have been plaguing American consumers. This revelation sheds light on a troubling connection between local scams and international crime, linking deceptive text messages to severe issues such as […]

Read More →

How Analyzing Past CVE Exploitation Trends Predicts Future Cyberattacks

Understanding past CVE (Common Vulnerabilities and Exposures) exploitation trends is crucial for cybersecurity teams aiming to predict and mitigate future cyberattacks. By analysing historical data, organisations can preemptively allocate resources, patch systems, and strengthen their defences against the next wave of threats. Key Points Past CVE exploitation trends help anticipate future attack vectors. Data-driven analysis […]

Read More →

ServiceNow and UKG Collaborate to Supercharge Employee Productivity and Efficiency With Agentic AI

UKG is teaming up with ServiceNow to amp up employee productivity and efficiency through the power of agentic AI. This collaboration aims to modernise digital employee experiences by simplifying operational and administrative tasks with a people-focused approach. Source: ServiceNow Press Release Key Points Integration of UKG’s AI solutions with ServiceNow’s AI Agent Fabric to improve […]

Read More →

Data Protection update – April 2025

Summary In the latest Data Protection update from Stephenson Harwood, significant developments in data protection and cyber security law for April 2025 are highlighted. This edition covers new ICO guidance on data anonymisation and the handling of children’s data, updates on cybersecurity laws, and enforcement actions against several tech companies, including TikTok and Amazon. Key […]

Read More →