Content Paint

Security

NCSC and ICO issue stark warning on ransoms

"Criminalising ransom payments could shift the focus of criminality from the perpetrator to the victim."

Microsoft backtracks on change to block Office macros, despite security concerns

“To say I'm disappointed is an understatement."

US DoD bug bounty programme reopens after flood of submissions

"At ease, soldiers! The findings have been outstanding..."

Trust no-one: the challenge of implementing Zero Trust in legacy environments

Strong walls aren't enough to stop attackers, writes Guy Warren.

HackerOne says worker stole vulns for profit – fired employee blasts ‘baseless claims’

"We have terminated the employee, and bolstered our defenses to avoid similar situations."

New Open CVDB project puts cloud vulnerabilities in the spotlight

“There is currently no universal standard for cloud vulnerability enumeration..."

Mitel 0day being used as access point for ransomware

Crowdstrike-discovered vuln added to CISA's Known Exploited Vulnerabilities list.

Supplier hack had “scope to impact entire telco industry”: Vodafone

Critical supplier to Vodafone, hundreds of others saw IT, OT systems breached

Liberty claws partial win against Investigatory Powers Act

"What is crucial is the function being carried out, not the identity of the body performing it."

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.