entry image

The Rise of AI and Machine Learning in Cybersecurity: Enhancing Threat Detection and Response

As the cyber threat landscape continues to evolve and become more sophisticated, organizations are turning to artificial intelligence (AI) and machine learning (ML) as a means of enhancing their defences and keeping up with the rapidly changing threat landscape. These technologies are being used to automate many of the processes that are required to detect and respond to threats in real-time, allowing organizations to quickly identify and respond to potential attacks before they can cause any damage.

Read More
entry image

Top Ten Best Practices for Corporate Cyber Security

Ensure the security of your business with these top ten best practices for corporate cyber security. From the implementation of strong passwords to regular security assessments, our guide covers all the essential measures that your organization should take to protect against cyber threats. Stay ahead of the evolving threat landscape and secure your sensitive information with our comprehensive guide.

Read More
entry image

Overview of Top Mobile Security Threats in 2022

As the amount and frequency of mobile threats grow, organizations require a comprehensive solution to protect against these security threats when users are not using the device itself. A top risk for mobile devices is malware, which is constantly evolving. Mobile malware is most concerned with stealing account credentials and encrypting sensitive data. At the other end of the spectrum is physical threat, which can be caused by physical security threats like power outages and theft.

Read More
entry image

The Importance of Security Testing Web Applications

In our day-to-day work, security testing is often overlooked, or even ignored at times. But, if you want to build a secure (and reliable) software system, you must take security testing seriously. The reason is simple: a system that is not secure can be the source of a majority of security problems that arise.

Read More
entry image

What is Shadow IT and why is it so risky?

Shadow IT is a new term for the practice of using external resources and/or software to improve the use of internal resources and/or software without paying for it or obtaining permission, sometimes even inside the company. According to Wikipedia, shadow IT is "the use of non-standard computer services and the use of software in order to improve the efficiency of internal systems or processes without the involvement of the companies that own those services".

Read More
entry image

TikTok Assures U.S. Lawmakers it's Working to Safeguard User Data From Chinese Staff

The company told lawmakers in a congressional hearing on Wednesday that it has reached agreements with several Chinese internet companies regarding how to use the social media app in the U.S. TikTok told House lawmakers that it has agreed to "provide certain non-identifiable personal information about users, including facial images, and the IP addresses used to access the TikTok app in connection with certain authorized uses.

Read More
entry image

Types of Penetration Testing (With Methodology)

While it’s true that the fundamental nature of penetration testing — probing a system to identify exploitable weaknesses and the damage they could cause — is always the same, each type of system requires a unique approach with certain elements being prioritised. When you consult an expert tester, they’ll advise you on the most suitable testing type (or types) for you.

It may be useful to relate this to the general practice of healthcare. The fundamental system of diagnosing injury and illness so it can be treated is static, but an orthopedist will approach things very differently to a dermatol...

Read More
entry image

Elfin Hacking Group Targets Multiple U.S. and Saudi Arabian Firms

An Iran-linked cyber-espionage group that has been found targeting critical infrastructure, energy and military sectors in Saudi Arabia and the United States two years ago continues targeting organizations in the two nations, Symantec reported on Wednesday.

Widely known as APT33, which Symantec calls Elfin, the cyber-espionage group has been active since as early as late 2015 and targeted a wide range of organizations, including government, research, chemical, engineering, manufacturing, consulting, finance, and telecommunications in the Middle East and other parts of the world.

Read More
entry image

Latest iOS 12.2 Update Patches Some Serious Security Vulnerabilities

Apple on Monday released iOS 12.2 to patch a total of 51 security vulnerabilities in its mobile operating system that affects iPhone 5s and later, iPad Air and later, and iPod touch 6th generation.

A majority of vulnerabilities Apple patched this month reside in its web rendering engine WebKit, which is used by many apps and web browsers running on the Apple's operating system.

Read More
entry image

Adobe Releases Critical Security Updates for Acrobat, Reader and Photoshop CC

Adobe has just released new versions of its Acrobat DC, Reader and Photoshop CC for Windows and macOS users that patch 48 vulnerabilities in its software.

A total of 47 vulnerabilities affect Adobe Acrobat and Reader applications, and one critical remote code execution flaw has been patched in Adobe Photoshop CC.

Read More