Automated traffic takes up 64% of internet traffic – and whilst just 25% of automated traffic was made up by good bots, such as search engine...
A new framework designed to test authentication protocols aims to plug the gaps left by popular vulnerability scanning tools. Raider is the brainchild of start-up DigeeX Security. It is designed to test...
Analysis from NCC Group’s Research Intelligence and Fusion Team (RIFT) has highlighted the growing threat of ransomware around the world. The number of ransomware attacks analysed...
Several zero-day vulnerabilities in a home baby monitor could be exploited to allow hackers access to the camera feed and plant unauthorized code such as malware. The security...
In the wake of the Colonial Pipeline cyberattack and an ensuing Executive Order, a renewed focus is being given to the strength and resiliency of our...
According to a report released by Honeywell, improving cybersecurity for operational technology (OT) systems ranks as one of the top priorities for surveyed facility managers over...
Seldom does a single week pass that we don’t hear about yet another cybersecurity attack. Some are minor, but with growing frequency, they can be catastrophic...
Cybersecurity accreditation provider CREST has branded NCC Group “vicariously responsible” participants in a cheating scandal first reported last summer. In August 2020, CREST was made aware...
The launch of the mobile applications allowing the storage and verification of the vaccination passport by the Quebec government (VaxiCode and VaxiCode Verif) has caused a...
While developers and security professionals aim to deliver secure applications quickly, development teams often lack certain coding knowledge. This secure development skills gap stems from the...