Want to get cloud IAM right? Master the fundamentals

Although networks, systems, and cyber security have come on in leaps and bounds, the fundamental theories of access control and the recent addition of identity to it (IAM) hasn’t really moved on... Read more »

UK Cyber Security Council launches certification mapping tool

The UK Cyber Security Council has launched the first phase of a certification mapping tool designed to help developing cyber professionals map all available security certifications onto 16 previously identified specialisms –... Read more »

Researchers see surge in scam websites linked to coronation

With days to go until the coronation of King Charles III, cyber fraudsters are seeking to capitalise on a surge in public interest, according to researchers at Kaspersky, who have uncovered multiple... Read more »

Web application firewall (WAF)

What is a web application firewall (WAF)? A web application firewall (WAF) is a firewall that monitors, filters and blocks Hypertext Transfer Protocol (HTTP) traffic as it travels to and from a... Read more »

Government is playing ‘psychic war’ in battle over end-to-end encryption

The government is playing a high-stakes game of chicken with technology companies by being “intentionally ambiguous” about the impact legislation going through Parliament that could undermine end-to-end encryption, a peer has claimed.... Read more »

Tenable opens playground for generative AI cyber tools

The security community is being invited to explore the potential of generative artificial intelligence (AI) to act as a useful tool in its research efforts, with the release of a number of... Read more »

SQL injection (SQLi)

What is a SQL injection (SQLi)? A SQL injection (SQLi) is a technique that attackers use to gain unauthorized access to a web application database by adding a string of malicious code... Read more »

Google Cloud seals bug that could have led to data breaches

Google Cloud has fixed a potentially dangerous application programming interface (API) vulnerability in its platform that, had it been exploited by malicious actors, could have led to widespread data breaches across multiple... Read more »

Researchers deal blow to Gootloader gang that supported REvil

Security researchers at managed detection and response (MDR) specialist eSentire have revealed how they are turning the tables on an expansive cyber crime operation that has lured in thousands of people working... Read more »

Ransomware gang exploiting unpatched Veeam backup products

Researchers at WithSecure have issued an alert after uncovering evidence that a notorious cyber criminal gang is exploiting a recently disclosed vulnerability in Veeam Backup & Replication data backup and recovery software... Read more »