Latest Articles

Black Hat Europe 2025: Was that device designed to be on the internet at all?

Black Hat Europe 2025: Was that device designed to be on the internet at all?

Black Hat Europe 2025: Was that device designed to be on the internet at all?

Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found

Tony Anscombe12 Dec 2025


Black Hat Europe 2025: Reputation matters – even in the ransomware economy

Black Hat Europe 2025: Reputation matters – even in the ransomware economy

Black Hat Europe 2025: Reputation matters – even in the ransomware economy

Being seen as reliable is good for ‘business’ and ransomware groups care about 'brand reputation' just as much as their victims

Tony Anscombe11 Dec 2025


Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity

Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity

Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity

If you don’t look inside your environment, you can’t know its true state – and attackers count on that

Steven Connolly11 Dec 2025


Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpiece

Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpiece

Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpiece

Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience.

Márk Szabó, James Shepperd, Ben Tudor10 Dec 2025


The big catch: How whaling attacks target top executives

The big catch: How whaling attacks target top executives

The big catch: How whaling attacks target top executives

Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe.

Phil Muncaster09 Dec 2025


Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture

Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture

Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture

Identity is effectively the new network boundary. It must be protected at all costs.

Phil Muncaster04 Dec 2025


MuddyWater: Snakes by the riverbank

MuddyWater: Snakes by the riverbank

MuddyWater: Snakes by the riverbank

MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware, improved tactics, and a predictable playbook

ESET Research02 Dec 2025


Oversharing is not caring: What’s at stake if your employees post too much online

Oversharing is not caring: What’s at stake if your employees post too much online

Oversharing is not caring: What’s at stake if your employees post too much online

From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into trouble.

Phil Muncaster01 Dec 2025


This month in security with Tony Anscombe – November 2025 edition

This month in security with Tony Anscombe – November 2025 edition

This month in security with Tony Anscombe – November 2025 edition

Data exposure by top AI companies, the Akira ransomware haul, Operation Endgame against major malware families, and more of this month's cybersecurity news

Editor28 Nov 2025


What parents should know to protect their children from doxxing

What parents should know to protect their children from doxxing

What parents should know to protect their children from doxxing

Online disagreements among young people can easily spiral out of control. Parents need to understand what’s at stake.

Phil Muncaster27 Nov 2025


Influencers in the crosshairs: How cybercriminals are targeting content creators

Influencers in the crosshairs: How cybercriminals are targeting content creators

Influencers in the crosshairs: How cybercriminals are targeting content creators

Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is key to stopping the fraudsters.

Phil Muncaster25 Nov 2025


MDR is the answer – now, what’s the question?

MDR is the answer – now, what’s the question?

MDR is the answer – now, what’s the question?

Why your business needs the best-of-breed combination of technology and human expertise

Steven Connolly24 Nov 2025


Apt Activity Report
MDR Protection