CyberAegis teams win two CyberPatriot national titles

The CyberAegis teams have achieved remarkable success, clinching national titles in both the Middle School and Open Divisions of the CyberPatriot competition. Coach Paul Johnson expressed immense pride in his teams for their stellar teamwork and determination throughout the challenging season of cybersecurity challenges. The teams emerged victorious despite changes in their affiliations, with CyberAegis […]

Read More →

Cyber Security | UK Regulatory Outlook April 2025

Summary The UK government has set forth a new policy statement regarding the impending Cyber Security and Resilience Bill, which aims to enhance cybersecurity regulations across various sectors. Key measures include expanding the regulatory framework, enhancing oversight capabilities for regulators, and empowering the secretary of state with new directional powers. The recent Cyber Security Breaches […]

Read More →

Researchers find numerous Apple AirPlay vulnerabilities allowing “wormable” exploits over Wi-Fi

Security researchers have uncovered a critical set of vulnerabilities in Apple’s AirPlay protocol that could allow attackers to remotely hijack devices without any user interaction. The exploit chain, known as “AirBorne,” consists of 23 individual bugs, including 17 that have official CVEs. This means that zero-click remote code execution is possible on vulnerable systems, putting […]

Read More →

DuPage County, Ill., Cyber Attack Shutters Justice Systems

A ransomware attack has forced the closure of vital systems in DuPage County, Illinois, impacting the sheriff’s office, circuit clerk’s office, and the courthouse. This incident, first identified around 2:30 a.m. Monday, has raised concerns about data security and operational continuity within the county’s justice system. Source: Naperville Sun Key Points A ransomware attack has […]

Read More →

SBOMs (as well as HBOMs and CBOMs) as Cybersecurity Facilitators

Software Bills of Materials (SBOMs) are increasingly recognised as essential tools in the realm of cybersecurity. They enable companies to locate and address software vulnerabilities, thus enhancing overall security. The article delves into the significance of SBOMs, HBOMs, and CBOMs, underscoring their role in managing software risks and ensuring compliance in today’s complex digital landscape. […]

Read More →

The Wiretap: The Worrying Rise Of ‘Violence-As-A-Service’

This article discusses the alarming trend of ‘violence-as-a-service’, highlighting how young people are being lured into committing violent acts for criminal organizations. Europol has reported that organised criminal groups are recruiting vulnerable teenagers, exploiting their situations to offer violent services online, effectively outsourcing illicit activities. Source: Forbes Key Points Europol warns that young people are […]

Read More →

Why cyber resilience must be part of every organization’s DNA

The latest LevelBlue’s 2025 Futures Report highlights a pressing need for organisations to integrate cyber resilience into their core strategies. Despite the increasing prevalence of AI-powered threats, many enterprises are pushing forward with new technologies with insufficient preparation for potential cyber risks. Key Points Only 29% of executives express hesitation to adopt AI tools due […]

Read More →