Security Think Tank: Don’t trust the weakest link? Don’t trust any link

“Secure as the weakest link.” I hear that a lot, but your security model should not fall apart just because a part of your business, or a business partner, has weak security.... Read more »

Snake Keylogger climbing malware charts, says Check Point

Emotet’s commanding position at the top of the malware threat charts seems as unassailable now as Bryan Adams’ record-breaking run at the top of the UK singles charts seemed in the long,... Read more »

Researchers find eight CVEs in single building access system

A series of eight newly designated common vulnerabilities and exposures (CVEs) in a building access control system built by HID Mercury and sold by Carrier – a global supplier of building systems... Read more »

Commercialising open source

Developing applications using open source components provides the architectural building blocks to accelerate digital transformation. But as it matures in the enterprise, IT leaders need to grasp the mindset shift that goes... Read more »

SolarWinds CEO offers to commit staffers to government cyber agencies

Sudhakar Ramakrishna, the CEO of SolarWinds, has used a panel appearance at the annual RSA Conference in San Francisco, California, to call for increased cooperation and collaboration between government and industry on... Read more »

SolarWinds CEO offers to embed staffers at government cyber agencies

Sudhakar Ramakrishna, the CEO of SolarWinds, has used a panel appearance at the annual RSA Conference in San Francisco, California, to call for increased cooperation and collaboration between government and industry on... Read more »

Trade body calls for public-private sector collab on digital ID

Industry trade association TechUK has published a report calling on the government and industry to work closely together on digital identity, setting out 10 steps it believes are urgently needed to deliver... Read more »

Cyber researchers step in to fill Patch Tuesday’s shoes

Ahead of the final Patch Tuesday, which true to precedent is due on Tuesday 14 June, analysts at Recorded Future are stepping into the breach, launching a monthly report that will detail... Read more »

China using top consumer routers to hack Western comms networks

Long-standing vulnerabilities in popular consumer and home office Wi-Fi routers made by the likes of Cisco, D-Link, Netgear and ZyXel are being routinely exploited by threat actors backed by the Chinese government... Read more »

ProxyLogon, ProxyShell may have driven increase in dwell times

Mass exploitation of the ProxyLogon and ProxyShell vulnerabilities in Microsoft Exchange Server by so-called initial access brokers (IABs) seems to have driven a substantial increase in median dwell times, which rose by... Read more »