threat intelligence

Why asset visibility matters in industrial cyber security

Industrial organisations continue to face growing cyber threats from adversaries – ranging from sophisticated state-sponsored groups to hacktivists and financially motivated criminals. These actors are not just targeting data or demanding ransoms, they are affecting physical processes and critical services. A common risk across many of these incidents is one that is still underestimated: insufficient…

Why asset visibility matters in industrial cyber security Read More »

Ransomware resilience: It’s time to be ‘more Bruce Lee’

I don’t imagine there are many CISOs who use Bruce Lee as a point of reference for enhancing cyber security strategies? However, the philosophy of his hybrid martial art – Jeet Kune Do – is based on many principles relevant for staying ahead of ransomware hackers. The UK’s National Crime Agency recently highlighted how the ransomware…

Ransomware resilience: It’s time to be ‘more Bruce Lee’ Read More »

The US government shutdown is a wake-up call for cyber self-reliance

The ongoing US government shutdown in October 2025 ignited global widespread concern about cyber security vulnerabilities, especially due to the temporary lapse of the Cybersecurity Information Sharing Act (CISA) of 2015, which slowed federal threat intelligence funding. However, the true risk exposed by the shutdown is not the pause in government operations, but rather a…

The US government shutdown is a wake-up call for cyber self-reliance Read More »

UK ramps up ransomware fightback with supply chain security guide

The UK government has released new anti-ransomware guidance designed to address the weaknesses in supply chains that have been the ultimate source of several of many of the record 204 “nationally significant” incidents dealt with by the National Cyber Security Centre (NCSC) in the past year. Developed alongside the Singapore authorities as part of a…

UK ramps up ransomware fightback with supply chain security guide Read More »

US government shutdown stalls cyber intel sharing

The US Cybersecurity and Information Sharing Act (CISA) of 2015 has expired with no replacement or extension in place amid a chaotic shutdown of the federal government, leaving cyber pros in legal limbo and putting global collaboration on threat intelligence at risk of stalling. The shutdown took effect at the stroke of midnight on 1…

US government shutdown stalls cyber intel sharing Read More »

Netherlands establishes cyber resilience network to strengthen public-private digital defence

The Netherlands has launched a Cyber Resilience Network, a public-private partnership aimed at fundamentally overhauling the nation’s approach to digital defence.   The initiative, detailed in a comprehensive building plan from the National Cyber Security Centre (NCSC-NL), aims to connect over 1,152 organisations in a collaborative framework that extends far beyond simple information sharing to include…

Netherlands establishes cyber resilience network to strengthen public-private digital defence Read More »

Over half of India-based companies suffer security breaches

Global supply chains could be vulnerable to attack through third-party suppliers in India, as a report reveals that over half suffered breaches in the country last year. According to research by SecurityScorecard, Indian companies across multiple sectors – including manufacturers supplying the aerospace and pharmaceuticals industries, as well as IT services firms – have security…

Over half of India-based companies suffer security breaches Read More »

Are AI agents a blessing or a curse for cyber security?

Artificial intelligence (AI) and AI agents are seemingly everywhere. Be it with conference show floors or television adverts featuring celebrities, suppliers are keen to showcase the technology, which they tell us will help make our day-to-day lives much easier. But what exactly is an AI agent? Fundamentally, AI agents – also known as agentic AI…

Are AI agents a blessing or a curse for cyber security? Read More »

Apple iOS update fixes new iPhone zero-day flaw

Apple has pushed another update to its mobile operating systems, iOS and iPadOS, to address a newly discovered zero-day that is already being exploited by threat actors in the wild to enable so-called zero-click attacks. Tracked as CVE-2025-43300, the flaw is an out-of-bounds write issue in the ImageIO framework – which is used to enable…

Apple iOS update fixes new iPhone zero-day flaw Read More »

Ransomware attack volumes up nearly three times on 2024

The number of ransomware attacks that were observed and tracked during the first six months of 2025 was up by 179% – almost three times – on the same period in 2024, according to statistics published by threat intelligence platform provider Flashpoint. The past year has seen significant turnover among cyber criminal threat actors with…

Ransomware attack volumes up nearly three times on 2024 Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top