Features 17.12.2024
Five Incidents that Shaped the Cybersecurity Landscape in 2024
Assured Intelligence has compiled a breakdown of the top events that helped define the security landscape in 2024
If there’s a topic that floats your boat, click on the options below to explore all related articles.
102 results for "Cyber attacks"
Features 17.12.2024
Assured Intelligence has compiled a breakdown of the top events that helped define the security landscape in 2024
Interviews 12.12.2024
Co-founder and CEO of th4ts3cur1ty.company, Eliza-May Austin, is a force to be reckoned with.
Features 03.12.2024
How close are we to the end of encryption as we know it?
Blogs & Opinions 28.11.2024
Among the shifting ransomware ecosystem landscape, two new groups are worth noting.
Features 26.11.2024
How well did UnitedHealth handle the breach, and what can others learn from it?
Features 21.11.2024
In an era of increasing ransomware, backups aren’t enough. Are new capabilities to restore your entire tech infrastructure the answer?
Interviews 19.11.2024
Nadir Izrael is co-founder and CTO at Armis. He shares his story with Assured Intelligence.
Blogs & Opinions 14.11.2024
Conor O’Neill highlights the true cost of a data breach to your company and how businesses can minimise future risks.
Features 05.11.2024
Can reputation damage after a breach be mitigated with smarter crisis comms?
Features 31.10.2024
Reports claim that the majority of attributable malware-based attacks are now state-sponsored. What does this mean for CISOs?
Blogs & Opinions 24.10.2024
There are now 300 identified malware families for macOS.
Features 22.10.2024
On October 3 2024, American Water, the largest water company in the US, discovered it had been hit by a cyber attack
Features 15.10.2024
The NCSC is building “a nation-scale evidence base” for cyber-deception
Features 03.10.2024
Are your employees gamers? And if so, what does that mean for your security posture?
Interviews 01.10.2024
How does one transition from windsurfing instructor to cybersecurity tech director? Dan Bridges knows…
Features 26.09.2024
The British Library has shared a detailed report of the 2023 cyber incident and its aftermath. Assured Intelligence picks out the highlights for our autopsy report
Features 24.09.2024
137 million email addresses were leaked, alongside 272 million social security numbers.
Features 19.09.2024
What do SaaS customers need to do to harness the benefits of the cloud without inviting excessive cyber risk?
Blogs & Opinions 17.09.2024
The capabilities of GenAI are aiding and speeding up the creation of effective ransomware toolkits
Features 29.08.2024
Cybersecurity is often a ‘grudge purchase’ made after a successful cyber attack has damaged a company, rather than before.
Interviews 21.08.2024
What keeps Cyro Cyber’s CISO up at night? Here’s a spoiler…it’s people!
Features 15.08.2024
Do shipping companies feel anchored down by cyber risk?
Blogs & Opinions 08.08.2024
Reflecting on 2024 so far, the cyber danger zones can be divided into key areas.
Features 01.08.2024
The monthly addition of edge service and infrastructure CVEs rose by 22%. So, how can CISOs protect the edge more effectively?
Blogs & Opinions 30.07.2024
When it comes to protecting healthcare data and systems, the threat is high, and the stakes are even higher, warns Dr. Darren Williams In early June 2024, major London hospitals, including Kings College Hospital and Guy’s and St Thomas’s, declared a critical incident following a ransomware attack on Synnovis, a pathology services provider. This cyber […]
Blogs & Opinions 25.07.2024
The Labour government promised “change” as its big election manifesto theme. Will that stretch to cyber?
Features 23.07.2024
Ransomware groups often rebrand, resurfacing with a new identity. Kate O’Flaherty explores what this means for law enforcement and lists the most significant ransom group rebrands Ransomware never goes away, nor do the groups that use the data-locking malware in attacks. Despite multiple initiatives, sanctions, and attempts by law enforcement to make arrests, ransomware groups […]
Features 16.07.2024
Multiple celebrities and big brands, including Paris Hilton, CNN, and Sony, were hit by the TikTok ‘zero-click’ attack.
Features 04.07.2024
Six NHS trusts in London and countless GP practices in surrounding regions recently suffered major disruption after a ransomware attack
Features 02.07.2024
The PSTI Act came into play in April 2024, aiming to improve resilience for notoriously insecure IoT devices
Features 11.06.2024
This incident shows breaches can inadvertently compromise the data of individuals who may not have had a Dropbox account
Features 30.05.2024
In a sector focused on building physical things, digital threats have often played second fiddle to physical risks on-site.
Features 28.05.2024
Often perpetrated by organised crime groups operating overseas aiming to extort cash, sextortion is a growing issue.
Features 21.05.2024
The (cyber) threat posed by China is well-documented.
Features 14.05.2024
Education was the most attacked sector in the UK in the last six months
Features 07.05.2024
We used AI to clone the voices of myself and our CEO to launch a targeted phishing attack on an Assured team member!
Features 23.04.2024
After KNP declared bankruptcy following a ransomware attack last year, we investigate the top cyber risks facing the logistics sector.
Features 03.04.2024
The MOVEit file transfer software impacted tens of millions of end customers
Features 21.03.2024
Phil Muncaster investigates why an industry that deals in knowledge is particularly exposed to info theft and extortion
Blogs & Opinions 19.03.2024
What’s changed in the ransomware landscape in 2024? Chris Rogers considers the psyche of those writing the code and looks at new tactics, tools and the prevalence of double-extortion ransomware The cybersecurity ecosystem moves at an extremely rapid pace. However, in the months ahead, it seems inevitable that organisations will be faced with even more […]
Interviews 07.03.2024
Meet Dirk Schrader, field CISO (EMEA) and VP of Security Research at Netwrix.
Features 05.03.2024
How BEC is becoming a bigger threat and what you can do about it
Features 08.02.2024
The latest report from the NCSC claims AI will “almost certainly increase the volume and heighten the impact of cyber attacks over the next two years.”
Features 06.02.2024
It’s been nearly a year since ChatGPT burst into the mainstream, but what’s the impact on cybersecurity?
Features 01.02.2024
Take it with more than a pinch of salt, artificial intelligence should be at the top of every CISO’s watchlist for 2024
Features 25.01.2024
The House of Commons and House of Lords released a report on UK national security, warning that the UK is at risk of a catastrophic ransomware attack. Assured Intelligence breaks that down.
Interviews 23.01.2024
There’s @LisaForteUK. And then there’s Lisa Forte. Most people only know the former, but Eleanor Dallaway met the ‘real Lisa Forte’ for a walls down heart-to-heart.
Features 18.01.2024
The decision that 23andMe took to blame the victims for a serious data breach has baffled many cybersecurity and PR experts
Blogs & Opinions 04.01.2024
Evolving cyber threats requires evolving threat intelligence. Here’s how to do it.
Features 02.01.2024
When an AI-enabled voice cloning cyber attack fools a branch manager into transferring £27m out of the business, it’s time to pay attention to the new cyber weapon
Blogs & Opinions 26.12.2023
Forty per cent of enterprise apps involve uploading content, code, files, or spreadsheets for AI assistance. This raises huge data leakage questions.
Features 21.12.2023
Assured Intelligence talks to hacktivist group GhostSec to get its perspective on industrial control system threats
Features 19.12.2023
There’s no such thing as a quiet year on planet cybersecurity. This year’s headlines are next year’s lessons
Features 14.12.2023
Six lessons that all businesses should take from the Allen & Overy ransomware incident
Features 07.12.2023
Who’s legally liable when aggregation site customers are targeted by hackers?
Blogs & Opinions 05.12.2023
One year older, but is it one year wiser?
Features 30.11.2023
Is there any such thing as ransomware that’s ‘not so bad’?
Features 23.11.2023
Silence is golden. Except when it comes to cyber attacks…
Features 21.11.2023
Sony’s reputation has taken a bashing over the last few months after it was hit by two high-profile breaches.
Features 16.11.2023
Fraudsters continue to adapt their business email compromise techniques to make a fortune
Features 09.11.2023
SolarWinds CISO Tim Brown has been explicitly named for allegedly failing to inform investors or act on known security vulnerabilities. Callum Booth talks with CISOs to figure out what this means for the future of the CISO role At the end of October, shockwaves rippled through the cybersecurity sector. Following 2020’s notorious Sunburst attack, the […]
Features 07.11.2023
The high-stakes, high-traffic days of Black Friday and Cyber Monday promise skyrocketing sales but also lurking cyber attacks
Features 26.10.2023
Top trends include ransomware, nation-state attacks and business email compromise
Features 17.10.2023
Assured Intelligence introduces seven hacking groups that have risen to infamy, running amok in global networks and leaving a trail of disruption
Blogs & Opinions 03.10.2023
The stakes just got higher in the world of cyber espionage.
Interviews 21.09.2023
If you had one hour to ask a ransomware negotiator anything at all, what would you ask?
Blogs & Opinions 19.09.2023
No Technical skills or expertise? No problem. You can still become a cyber criminal…
Features 14.09.2023
Patching security holes is an exhausting but essential part of risk management. Assured Intelligence looks at some of 2023’s biggest security flaws
Features 07.09.2023
The retail sector has made headlines due to many high-profile (and costly) data breaches. What can retailers do to stay clear of the front pages?
Features 31.08.2023
Supply chain risk is responsible for a lot of those big-ticket cyber headlines. What can you do about it?
Blogs & Opinions 29.08.2023
The AI technology used to execute next-gen social engineering attacks can also be deployed to defend against them. Here’s how to be on the right side of it…
Features 22.08.2023
How can execs protect their business from becoming a victim of ransomware?
Blogs & Opinions 08.08.2023
Cyber risk is increasingly prevalent as a Boardroom topic, but just talking about it isn’t enough…
Features 03.08.2023
If you don’t know where you stand with the spyware threat, read on…
Features 13.07.2023
There are five categories of cyber scams that can fool even the shrewdest of people. Here’s how not to get caught out.
Features 11.07.2023
If you don’t have time to read all 89 pages of the Verizon’s DBIR, Assured Intelligence has pulled out the highlights in a five-minute read
Features 06.07.2023
From Americold to SolarWinds, logistics companies have been, and continue to be, vulnerable to cyber attacks. Eugene Yiga investigates
Features 04.07.2023
How can organisations bolster their cybersecurity against nation-state threats?
Features 29.06.2023
Assured Intelligence has taken a look at some of the companies that have gone out of business due to a cyber-attack to bring you the low-down on what happened in each case.
Interviews 27.06.2023
Disclaimer: This interview took place over fish, chips, and a good old-fashioned pint. Or two. Ladies and gentlemen, I present to you: Rik Ferguson.
Features 15.06.2023
The ransomware attack on ION is a stark reminder of the increasing cyber threats that financial institutions face.
Blogs & Opinions 08.06.2023
Ellen Sundra considers benchmarking, connectivity, scaling and automation.
Interviews 06.06.2023
Professor Alan Woodward’s CV is impressive, to say the least. Equally as impressive as his straight-talking, no-nonsense and highly articulate way of communicating cyber risk. Ladies and Gents, meet Professor Alan Woodward
Features 30.05.2023
Attack prevention is a much-talked about area of security, but what happens after a breach takes place?
Features 23.05.2023
Clear, concise and transparent communication can help limit the damage to a firm’s reputation following a cyber-attack, but it’s not easy to get right
Features 16.05.2023
There are three categories of hackers particularly interested in targeting the energy sector. Who are they? And what can be done to protect energy?
Features 02.05.2023
The exposure of the leaked ransom negotiation logs may suggest a failed negotiation, but on closer inspection, many consider it a well-played hand by Royal Mail
Features 28.04.2023
Calls to stop the training of artificial intelligence models could backfire big time. Hear from cybersecurity experts about why.
Features 25.04.2023
The Online Safety Bill has laudable aims, but experts believe it will make UK businesses a huge target by undermining encryption. Phil Muncaster investigates
Features 13.04.2023
The human operating system is flawed and leaves people vulnerable to cyber attack. But mindfulness might be a defence mechanism, finds Etashe Linto
Features 30.03.2023
Kate O’Flaherty explores why cyber attacks on healthcare organisations are on the rise and makes a diagnosis for a sector under constant attack
Features 14.03.2023
Government operations are being created to deal with the ransomware epidemic, but will it be enough to turn the tide?
Features 03.03.2023
Kate O’Flaherty compiles five outrageous cybersecurity predictions for 2023 made by experts with their tongues firmly in their cheeks
Features 23.02.2023
Why are architects and the companies they work with in construction and engineering among those least prepared for a cybersecurity attack?
Features 16.02.2023
Large quantities of sensitive data coupled with chronic under-investment in security have made the legal sector a prime target for cyber criminals.
Features 15.02.2023
Many have been quick to reprehend Royal Mail for its handling of the recent cyber attack. Gordon Smith analyses the response to deliver a verdict on Royal Mail’s operation
Features 07.02.2023
Cyber incidents can define a CEO’s career, as can a blush-worthy security faux pas.
Features 07.02.2023
It’s hardly setting the world alight by announcing that determining cyber risk is crucial to a successful cybersecurity response. Kathryn Pick helps to identify how an organisation goes about identifying where that risk lies