Phishing attacks are harder to spot on your smartphone. That's why hackers are using them more

There’s been a surge in mobile phishing attacks targeting the energy sector as cyber attackers attempt to break into networks used to provide services including electricity and gas.  The energy…

The ‘Trojan Source’ Attack Method Allows the Injection of Vulnerabilities Into Open-Source Code

Unfortunately, by using this method the vulnerabilities cannot be detected by human reviewers. To build vulnerable binaries, Trojan Source uses a simple method that does not need to alter the…

Toronto subways hit by ransomware as US lawmakers slam 'burdensome' cybersecurity rules

Special feature Cyberwar and the Future of Cybersecurity Today’s security threats have expanded in scope and seriousness. There can now be millions — or even billions — of dollars at…

Cyberattack Impacts Canadian Province HealthCare Network

A cyberattack on Newfoundland and Labrador, the easternmost province of Canada, has resulted in significant disruption for healthcare providers and medical facilities. The incident occurred on October 30th, causing regional…

56% of UK Businesses Plan to Hire a CISO

56% of UK Businesses Plan to Hire a CISO More than half (56%) of UK businesses plan to employ a chief information security officer (CISO) in the next 6-24 months…

Heimdal™ Security and Techni Team Announce Strategic Partnership

Copenhagen, November 2nd, 2021: Heimdal™ Security and Techni Team are pleased to announce they have entered into a strategic partnership, combining Heimdal™’s industry-leading cybersecurity services with Techni Team’s next-gen ICT…

Google just tripled its bounty for Linux kernel bugs. Here's why

Google has kicked off a special three-month bug bounty targeting flaws in the Linux kernel with triple the rewards for security researchers. The new bounty, announced this week, looks to…

Most Computer Code Compilers Vulnerable to Novel Attacks

Most Computer Code Compilers Vulnerable to Novel Attacks Most computer code compilers are at risk of ‘Trojan source’ attacks in which adversaries can introduce targeted vulnerabilities into any software without…

Businesses don't talk about being victims of cyberattacks. That needs to change

Organisations need to have better plans in place to prevent cyberattacks – but they should be more transparent about when they do fall victim to hackers in order to prevent…

Squid Game cryptocurrency creators pull the rug from under investors, steal millions

A cryptocurrency project based on Squid Game has allegedly pulled an exit scam, with millions of dollars stolen from investors.  Popular trends, whether they are meme coins, desired products, or…