top of page


Compromised code repositories highlight supply chain risk
Besides ransomware and phishing, application supplier risk is a growing concern, as attacks against code repos are getting more frequent.
Aug 10, 2022


Universities are highly attractive targets for email fraud
Universities are valuable "brands" for attackers to use in email impersonation attacks. Too few use DMARC to counter the attacks.
Aug 9, 2022


Kubernetes is growing, creating new challenges
Kubernetes adoption is growing fast, creating a gap in skills and management tools.
Aug 8, 2022


Ransomware – the current impact on organizations
A survey of more than 500 IT security decision makers in US and UK organizations details the impact of ransomware.
Aug 5, 2022


VMware urges to patch critical vulnerability CVE-2022-31656
VMware is urging administrators to patch several critical vulnerabilities. Fortunately, not so critical as last year's Vsphere bugs.
Aug 4, 2022


The risks of real customer data in testing environments
Test environments and datasets containing real customer data are a source of data leak risk.
Aug 3, 2022


Ransomware attacks decrease?
An unexpected slowdown in ransomware attacks due to volatility in cryptocurrency markets and law-enforcement focus.
Aug 2, 2022


Attackers find new ways to bypass Microsoft's macro protection
Threat actors are increasingly using container files such as ISO, RAR and LNK shortcuts to distribute Office macro malware.
Aug 1, 2022


Mobile apps are increasingly important but are we aware of cyber risks?
Mobile apps in production are vulnerable to threats, but the risks receive lower priority and funding.
Jul 31, 2022
bottom of page