Attack on the devs: Why data exfiltration is a top threat to 2025 supply chains
55% of open source malware now targets developers. Here’s why data exfiltration is a top threat to supply chains in 2025 – and how to defend against it.
Read More55% of open source malware now targets developers. Here’s why data exfiltration is a top threat to supply chains in 2025 – and how to defend against it.
Read MoreIn the realm of cybersecurity start-ups, there is a widely held belief that the key to success lies in obtaining investor capital. However, recent data from Crunchbase shows a significant 35% decline in funding, raising the question of whether this belief still holds true.
Read MoreMazin Ahmed (Founder and CTO at Fullhunt.io) explains how he built a successful cybersecurity startup during the COVID-19 pandemic.
Read MoreThreat actors deploying Atomic Stealer (AMOS) are launching malicious ad campaigns to target Mac users.
Read MoreNeil J. Walsh will discuss various interpretations of cybercrime, divergent regulatory frameworks, and discrepancies in digital forensic capabilities. Ensuring the accuracy of cybercrime reports worldwide poses a significant challenge
Read MoreData alone is not intelligence – but unified security systems can build an understanding of context around a piece of data, enabling better threat identification and decision-making.
Read MoreThere’s no globally accepted definition of cyber diplomacy or cyber crime. Developing those cross-border agreements is an important step to enable cooperation and resilience.
Read MoreHands-on opportunities to build your skill as an ethical hacker in controlled environments include Capture the Flag events, and hacking lab environments.
Read MoreThe rise of Ransomware as a Service (RaaS) means that inexperienced cyber criminals can launch effective attacks with minimal technical skill, exploiting and extorting more victims.
Read MoreA look at the key ransomware threats in 2024 that organisations and cybersecurity professionals need to be aware of.
Read MoreFour startups that are making cybersecurity more accessible.
Read MoreDiscover recent developments in accessibility policy for cybersecurity, and learn why accessibility matters for the future of cyber resilience.
Read More