Ransomware and the Board’s Role: What You Need to Know

Posted by Ray Garcia, Matt Gorham, and John Boles, PricewaterhouseCoopers, on Saturday, May 10, 2025 Summary As ransomware attacks rise globally, boards need to actively engage in strengthening cybersecurity and resilience planning. With advanced attack methods and the growing “ransomware as a service” ecosystem, organisations face increased vulnerability, particularly with the shift towards remote work […]

Read More →

Brits warned of ‘seemingly harmless’ WhatsApp message scamming people out of thousands

Summary Cybersecurity experts are alerting the British public to a rapidly evolving scam involving messages on platforms like WhatsApp, SMS, and iMessage. These messages often begin innocently, with phrases such as “Hi Mum, I’ve lost my phone.” However, fraudsters are now employing AI-generated voice notes to convincingly mimic children or loved ones in distress, creating […]

Read More →

Companies are going hardcore. It means one classic piece of career advice is getting more crucial.

This article from Business Insider explores the increasing necessity of documenting your work achievements in today’s competitive job market. It highlights how tracking your performance can influence your career advancement and job security as companies tighten their focus on employee metrics. Source: Business Insider Key Points Job performance evaluation is becoming more critical as companies […]

Read More →

Reactive Hiring Is Holding Many Organizations Back – New Research by HR.com Research Institute

In a recent study by the HR.com Research Institute, it’s revealed that many organisations are still stuck in the old ways of hiring reactively, rather than proactively planning for talent acquisition. This research shows a staggering disconnect between the priorities of HR teams and their actual recruitment practices. Key Points 51% of organisations rely on […]

Read More →

How Top Researchers Stay Ahead of Evolving CVE Exploitation Techniques

This resource explores how leading cybersecurity researchers anticipate and counteract evolving techniques used to exploit CVEs, emphasising methodologies, collaborative efforts, and tools that provide a proactive edge against emerging threats. Summary Staying ahead of rapidly changing CVE exploitation methods demands an adaptive and forward-thinking approach. Top cybersecurity researchers combine intelligence gathering, proactive research, and community […]

Read More →

Methods to Confirm if a CVE is Being Actively Exploited by Threat Actors

This resource explores reliable methods to confirm the active exploitation of a CVE by threat actors. It covers threat intelligence analysis, network monitoring, honeypot deployment, log analysis, and leveraging external advisories, providing a foundational guide for cybersecurity practitioners. Cybersecurity professionals often face the urgent task of determining whether a given CVE is being actively exploited […]

Read More →