Nearly two dozen individuals charged with purchasing and using payment cards stolen from national retail chain
NHS to Share Patient Data with Third Parties, Fueling Privacy and Security Fears
Sensitive data will be made available to academic and commercial third parties for research and planning
How Hidden Vulnerabilities will Lead to Mobile Device Compromises
Your mobile device can be hacked very easily without your knowledge. Even if an attacker can’t get into your device they can attempt to gain access to the sensitive information instead that is stored inside such as your places visited, emails and conta…
UK Police Suffered Thousands of Data Breaches in 2020
Lancashire Constabulary was the worst offender
Bose Reveals Ransomware Attack Impacting Staff
Threat actors accessed sensitive personal information
Europe’s Top Human Rights Court Rules UK Mass Surveillance Illegal
Case could pave way for challenges to Snooper’s Charter
ThinkPHP Exploit Actively Exploited in the Wild
Blog Blog https://www.akamai.com/blog CySecBot CySecBot
US to Regulate Pipeline Cybersecurity
Department of Homeland Security to issue first cybersecurity regulations for pipelines after Colonial cyber-attack
E-tailers See Surge in Automated Fraud
Research into 2020 automated e-commerce fraud finds higher volume, frequency and sophistication
New Coordinates
Folks,I hope this finds you all doing well. As some of you may now, over the years, I have shared numerous perspectives on foundational cyber security and on Active Directory security, both here (i.e. on this blog) and at my second blog.Unfortuna…