Cybercrime in the energy sector

Cybercrime in the energy sector

Cyber attacks on the global energy industry have increased in recent years; between 2020 and 2022, the number of weekly cyberattacks more than doubled from 499 to 1101. And an attack on this sector can have far-reaching effects, perhaps more than any other industry....
Should weak passwords be banned?

Should weak passwords be banned?

Are you one of the millions of people still using “123456” as their password? According to password management company, NordPass, this has been used more than 4.5m times, and it takes less than 20 seconds to crack. But, in the UK, weak passwords will soon be a thing...
Social engineering hides a backdoor in plain site

Social engineering hides a backdoor in plain site

A recent incident where a backdoor was introduced into XZ Utils’ open-source software in plain sight shows how effectively malicious actors can use social engineering for their own gains.  What is XZ Utils? XZ Utils is a set of free software command-line lossless data...
8 Cybersecurity predictions for 2024

8 Cybersecurity predictions for 2024

Global technology research and consulting firm, Gartner, recently revealed their top eight cybersecurity predictions for the next few years. The way companies hire cybersecurity workers will change over the next few years as the adoption of generative AI will close...
Cybercrime in the manufacturing sector

Cybercrime in the manufacturing sector

One of the most targeted sectors for cybercrime globally is manufacturing. In 2023, it was the industry with the highest share of cyberattacks, encountering around 25% of the worldwide total. Of these, malware and ransomware were the top types of attack. The average...
End-to-end encryption: How secure is it?

End-to-end encryption: How secure is it?

As a security feature that comes with many messaging apps and data sharing software, end-to-end encryption is a way of making sure your communications and data is protected. However, is it as secure as we believe? What is end-to-end encryption? End-to-end encryption...