CIOs pay too much for not enough IT security

Summary The Logicalis Group’s recent report sheds light on the troubling realities facing CIOs: they are pouring excessive resources into IT security that fails to deliver adequate protection. A staggering 90% of organizations experienced a breach in the past year, highlighting the futility of their investments in complex security systems. Many respondents admitted to over-purchasing […]

Read More →

Top ticket resale platform hit by data breach

Summary Ticket reselling platform Ticket To Cash has come under fire after a cybersecurity researcher found its unprotected database online. This exposed sensitive information of hundreds of thousands of customers. Jeremiah Fowler, the researcher, contacted the company to secure the database, revealing that it contained over 520,000 records and a massive size of 200 GB. […]

Read More →

Hundreds of top ecommerce sites under attack following Magento supply chain flaw

Summary Hundreds of ecommerce websites, including some prominent ones, have fallen victim to a cybersecurity breach linked to corrupted Magento extensions that had been dormant for six years. Researchers from Sansec uncovered the supply chain attack, revealing 21 compromised Magento extensions from three providers: Tigren, Meetanshi, and MSG, with some of the backdoors dating back […]

Read More →

Beyond The AI Gold Rush: Building Value Through Information Quality

Increasingly, businesses are rushing to implement AI systems to boost productivity and competitive advantage. However, in “Beyond The AI Gold Rush,” Stéphane Donzé warns that without ensuring the quality of the information provided to these AI systems, companies may face catastrophic risks. The article emphasises the importance of careful integration of AI tools, starting with […]

Read More →

Half of employees knowingly share risky social media posts

According to research from security firm CyberArk, nearly half (49%) of employees admit to posting on social media in ways that could harm their employers financially and reputationally. The study reveals that many workers also access workplace tools on personal devices lacking security controls, raising significant concerns about cybersecurity. Source: HR Magazine Key Points 49% […]

Read More →

Is Complacency to Blame for Businesses Underinvesting in Cybersecurity?

Many businesses are currently underinvesting in cybersecurity despite the rising frequency of data breaches and their staggering costs. This curious phenomenon is often attributed to a lack of information and funding; however, complacency is emerging as a significant yet subtle contributor to this issue. Key Points Many firms—particularly small to mid-sized businesses—believe they are unlikely […]

Read More →

I’m a cybersecurity expert – Here’s the No1 sign your phone has been hacked

In a landscape where hackers are on the prowl, one key sign could reveal if your smartphone has fallen victim. This article from cybersecurity expert Akash Mahajan unveils how to spot potential mobile hacking through an unexpected symptom: excessive battery drain. Key Points Experience rapid battery depletion? It might indicate malicious software running on your […]

Read More →

University of York to establish campus in India to target business and tech sectors

The University of York is expanding its global reach by opening a new campus in Mumbai, India. A memorandum of understanding was signed with the Chief Minister of Maharashtra, marking a significant step in this initiative. The campus is expected to open by the academic year 2026/27, pending approval from India’s University Grants Commission. Initially, […]

Read More →

Is Complacency to Blame for Businesses Underinvesting in Cybersecurity?

Many businesses continue to underinvest in cybersecurity, despite the growing threat of data breaches and cyberattacks. This article delves into why complacency may be a silent killer in the fight against cybercrime. Source:CEOWORLD magazine Key Points Companies often believe they are unlikely targets, leading to a dangerous complacency. Cybersecurity threats evolve rapidly; outdated security measures […]

Read More →