Historic Global Leak : 16 Billion Logins Exposed

A massive trove of stolen usernames and passwords totalling 16 billion records has been discovered across 30 newly uncovered databases, revealing one of the largest and most dangerous credential breaches ever recorded. Two Login Credentials for Every Person on Earth Security researchers at Cybernews have uncovered an unprecedented cache of login data scattered across unsecured…

Read More

US & UK Public Sectors Running Insecure IT

A major new study has revealed that 78 per cent of (US) public sector organisations are still operating with serious, unresolved software security flaws, some of which have persisted for over five years. Report Uncovers Widespread “Security Debt” The findings come from US-based application risk management firm Veracode’s Public Sector State of Software Security 2025…

Read More

Meta & Yandex Covert Tracking Concerns

Meta and Russian search firm Yandex used hidden background scripts to monitor Android users’ web activity without consent, bypassing incognito mode and browser protections, researchers say. Hidden Tracking System Uncovered A new joint investigation has revealed that Meta and Yandex have been covertly collecting the private web browsing data of Android users by exploiting local…

Read More

Legal Aid : Data Exposed

Hundreds of thousands of criminal, financial and personal records have been compromised in a major cyber attack on the UK’s Legal Aid Agency, raising serious questions about digital security in one of the country’s most sensitive justice systems. What Is the Legal Aid Agency And Why Was It Targeted? The Legal Aid Agency (LAA), part…

Read More

Italian Spyware Firm Accused of Distributing Malicious Apps

According to TechCrunch, it’s alleged that Italian spyware maker SIO has been distributing malicious Android apps designed to masquerade as WhatsApp and other widely used applications while covertly harvesting sensitive data from targeted devices. The spyware, dubbed ‘Spyrtacus,’ has been operating undetected for years, raising fresh concerns about government-backed surveillance tools and the extent of…

Read More

Almost Half of Young People Have Been Scammed Online

A new study in Wales has shown that nearly half (46 per cent) of young people aged 8 to 17 have fallen victim to online scams, with 9 per cent (including children as young as eight) having lost money to fraudulent schemes. Scams A Regular Part of Online Life For Young People A recent study…

Read More

UK’s New Cyber Severity Scale

The UK’s Cyber Monitoring Centre (CMC) has now started categorising cyber events using a scale designed to assess the impact and severity of attacks (similar to the Richter scale for earthquakes). What is the Cyber Monitoring Centre? The Cyber Monitoring Centre (CMC) is an independent, non-profit organisation founded by the UK’s insurance industry to enhance…

Read More

Tech Trends for 2025

ChatGPT Updates

As 2024 draws to a close, here we explore 15 key technological trends expected to shape 2025, highlighting innovations likely to influence business operations and strategies. Agentic Artificial Intelligence (AI) ‘Agentic’ AI refers to a new wave of AI systems that can autonomously plan and execute tasks based on user-defined objectives. Unlike traditional AI systems…

Read More

The Rising Cost Of API & Bot Attacks 

Following a recent report by cyber-security company Imperva about the rising costs to businesses of bot attacks and vulnerable APIs, we look at why it’s happening and what can be done.  Vulnerable APIs & Bot Attacks Costing Businesses $186 Billion  Imperva’s report was based on Marsh McLennan Cyber Risk Intelligence Centre’s study of data from…

Read More

Would You Be Filmed Working At Your Desk All Day?

Following a recent report in the Metro that BT is carrying out research into continuous authentication software, we look at some of the pros and cons and the issues around employees potentially being filmed all day at their desks … under the guise of cyber-security.  Why Use Continuous Authentication Technology?  Businesses use continuous authentication technology…

Read More