The official PHP Git repository suffered a software supply chain attack this week. Two malicious commits were pushed to the…
“Bad Things Come in Threes." Three historical vulnerabilities have been discovered in the Linux kernel. If exploited, it could be…
Why else should you attend the webinar? You'll not only receive expert insight into triggers and mistakes to avoid but…
Phishing attacks targeting Microsoft users are leveraging a fake Google reCAPTCHA page. Attackers are sending thousands of emails to steal…
Here’s a funny thing – recital 84 of the EU’s GDPR legislation states “…where processing operations are likely to result…
Threat actors are targeting companies to include Zillo, Amazon and Slack’s NodeJS applications by using a new vulnerability known as…
Apple’s new M1 chips had no known malware for them...until now. A vulnerability dubbed the “Silver Sparrow” is an activity…
Are you managing personal data deletion correctly under the DPA and GDPR? Does everyone in your organisation know what to…
Cyber security is a journey and not just a destination. In the ever-changing security landscape, regular testing and mitigation are…