How does a SQL injection attack work?
SQL injection
hacking

How does a SQL injection attack work?

Understanding one of the simplest, yet most-effective, methods of cyber attack
16 Apr 2021
HackBoss malware is using Telegram to steal cryptocurrency from other hackers
A collection of various coins with cryptocurrency logos embedded onto them
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

Hackers stealing from wannabe hackers using fake software
16 Apr 2021
US, UK say Russia was behind SolarWinds hack
Solarwinds logo seen on the smartphone screen, with simple C attack code on the paper background.
cyber attacks

US, UK say Russia was behind SolarWinds hack

President Joe Biden issues sanctions against 32 entities and officials, as well as expelling 10 diplomats
16 Apr 2021
Weekly threat roundup: Chrome, Exchange Server, IoT devices
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
vulnerability

Weekly threat roundup: Chrome, Exchange Server, IoT devices

Pulling together the most dangerous and pressing flaws that businesses need to patch
15 Apr 2021
University of Hertfordshire's entire IT system offline after cyber attack
A birds-eye view of the University of Hertfordshire
cyber attacks

University of Hertfordshire's entire IT system offline after cyber attack

Online classes are cancelled as every IT system is taken down by the attack
15 Apr 2021
Russia launched over a million cyber attacks in three months
Abstract silhouette of a computer hacker in front of a Russian flag
hacking

Russia launched over a million cyber attacks in three months

Unit 42 researchers found 75% of the attacks were critical
13 Apr 2021
BRATA malware disguises itself as security tools on Google Play
The Google Play Store application as shown on a smartphone display
malware

BRATA malware disguises itself as security tools on Google Play

Hackers are tricking victims into granting their malicious apps certain permissions before taking control of Android devices
13 Apr 2021
Best ransomware removal tools
A ransomware splash screen displayed on a laptop in an office
ransomware

Best ransomware removal tools

The top free and paid toolkits available right now to protect you from hackers
9 Apr 2021
Hackers leak data from dark web marketplace
Dark web person with code for a face
cyber security

Hackers leak data from dark web marketplace

Over 600,000 payment card records and 12,000 user records leaked
9 Apr 2021
What is ethical hacking? White hat hackers explained
A graphic displaying an ethical hacker
hacking

What is ethical hacking? White hat hackers explained

Not all hackers are motivated by greed - some of them use their powers for good
9 Apr 2021
Gigaset devices laced with malware after third-party server hack
Malware on an Android smartphone
malware

Gigaset devices laced with malware after third-party server hack

Several Android smartphones have been pre-packaged with malicious apps as part of a supply chain attack
9 Apr 2021
NCSC warns 15% of Brits use their pet's name as a password
A man and his dog using a laptop
hacking

NCSC warns 15% of Brits use their pet's name as a password

Independent survey reveals UK public still relies on memorable phrases to protect accounts
9 Apr 2021
Evidence suggests REvil behind Harris Federation ransomware attack
Young girl learning remotely
ransomware

Evidence suggests REvil behind Harris Federation ransomware attack

The trust’s financial records have been discovered on a dark web site known to be operated by the infamous group
9 Apr 2021
What is Microsoft Pluton?
Abstract image of the Microsoft logo ontop of a glowing processor
Security

What is Microsoft Pluton?

A quick look at Microsoft's new approach to CPUs that promises to revolutionise Windows security
8 Apr 2021
Weekly threat roundup: Fortinet, Apple Mail, AMD Zen 3 CPUs
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
vulnerability

Weekly threat roundup: Fortinet, Apple Mail, AMD Zen 3 CPUs

Pulling together the most dangerous and pressing flaws that businesses need to patch
8 Apr 2021
Data belonging to 500 million LinkedIn users found for sale on hacker marketplace
A user accessing LinkedIn on their mobile phone device
hacking

Data belonging to 500 million LinkedIn users found for sale on hacker marketplace

It's currently unclear whether the data is fresh or part of a historic breach
8 Apr 2021
What is cross-site scripting (XSS)?
JavaScript
cross-site scripting (XSS)

What is cross-site scripting (XSS)?

How XSS exploits work and how to defend against them
7 Apr 2021
Hackers sell $38 million in gift cards on Russian marketplace
Unknown hacker on a computer in a dark room
hacking

Hackers sell $38 million in gift cards on Russian marketplace

Amazon, Nike, Walmart, and Target among the brands targeted by Russian hacking dark web forum
7 Apr 2021
Wormable Android malware is spreading through WhatsApp messages
Malware on a phone
malware

Wormable Android malware is spreading through WhatsApp messages

Researchers found the malware hidden in an app pretending to be Netflix on the Google Play store
7 Apr 2021
Irish DPC says Facebook data leak affects “significant number" of EU users
Facebook phone app
hacking

Irish DPC says Facebook data leak affects “significant number" of EU users

The regulator is investigating the data leak involving the personal details of 533 million users
7 Apr 2021
European Commission hit by "significant" cyber attack
Pedestrian walks outside of the European Commission's building in Brussels, Belgium.
Security

European Commission hit by "significant" cyber attack

The EC has confirmed that an “IT security incident” had affected a number of EU institutions, bodies, and agencies' IT infrastructure
7 Apr 2021
Hackers target LinkedIn users with fake job offers to spread malware
A user accessing LinkedIn on their mobile phone device
malware

Hackers target LinkedIn users with fake job offers to spread malware

The Golden Chicken group is selling the More_Eggs backdoor to other groups as a malware as a service (MaaS) model
6 Apr 2021
Fortinet FortiOS vulnerabilities are being actively exploited
FBI headquarters on Pennsylvania avenue sign with traffic reflections at night
cyber security

Fortinet FortiOS vulnerabilities are being actively exploited

Malicious actors are exploiting the flaws to gain access to systems belonging to government and commercial entities
6 Apr 2021