Review: Metasploit, 2nd Edition

If you’ve spent any time in penetration testing, chances are you’ve crossed paths with Metasploit. The second edition of Metasploit tries to bring the book in line with how pentesters are using the tool. It mostly succeeds, with some caveats depending on your experience level and what you’re hoping to get out of it. About […]

Read More →

Tackling the rise of shadow AI: a guide for employers

This article dives into the pressing issue of unauthorised AI use by employees as the technology rapidly evolves and becomes easier to access. It discusses the inherent risks, including inaccuracies, cybersecurity threats, and possible data breaches that employers need to consider. The piece also offers guidance on establishing a solid AI framework to mitigate these […]

Read More →

Security awareness training isn’t stopping breaches. Can AI help?

Mick Leach, Field CISO at Abnormal AI, tackles the disappointing effectiveness of traditional security awareness training (SAT) in this enlightening video. Despite significant investments in SAT, human error—often the leading culprit in cybersecurity breaches—remains a persistent threat. Mick explores how integrating AI might just be the game-changer we need, offering a smarter and more personalised […]

Read More →

How Supply Chains Can Harness Public Data to Protect Against Cyber Threats

This article discusses how supply chains can leverage public data, specifically open-source intelligence (OSINT), to combat cyber threats. Insights derived from public data sources enable real-time risk detection, particularly crucial in contested logistics environments. Companies are advised to use OSINT strategically to enhance their cybersecurity initiatives. Source: SupplyChainBrain Key Points Open-source intelligence (OSINT) uses public […]

Read More →

Malware-as-a-Service (MaaS): An Emerging Cybersecurity Threat in the Supply Chain Industry

Malware-as-a-Service (MaaS) is radically changing the cybersecurity landscape, especially within the supply chain sector. It enables cybercriminals, armed with just a few hundred pounds, to launch sophisticated attacks without needing programming skills. This article highlights the accessibility and danger of MaaS, detailing how it poses an unprecedented threat to supply chain security. Source: Supply & […]

Read More →

Credential-Harvesting Blitz Puts Tinder, News Corp, Chick-fil-A on Alert

The hacking group known as “Scattered Spider” is causing a ruckus, targeting major companies like Tinder, News Corp, and Chick-fil-A. Their tactics include clever social engineering scams, where they impersonate company employees to extract sensitive information. They recently managed to breach the British retailer Marks & Spencer, severely impacting their operations and finances. With a […]

Read More →

Trump cuts could expose student data to cyber threats

Cybersecurity advocates are raising alarms over recent cuts and changes under the Trump administration that could put student data at risk. With valuable information like Social Security numbers and disciplinary records at stake, the need for robust cybersecurity measures in schools has never been more critical. Source: The Hechinger Report Key Points Cyberattacks on schools […]

Read More →

Israeli Privacy Authority Accuses CyberServe of Violations in a Data Breach

The Israeli Privacy Protection Authority (PPA) has taken action against CyberServe following a data breach incident in 2021 that exposed sensitive information, severely affecting individuals involved. The authority’s findings suggest negligence on CyberServe’s part regarding security measures, leading to the breach. Source:Article URL Key Points PPA issued a Finding of Wrongdoing against CyberServe for inadequate […]

Read More →