Mark Mayne

VPN hijack - compromise on Linux, Android and MacOS exposed

VPN hijack - compromise on Linux, Android and MacOS exposed

A flaw that affects most Unix-based operating systems, including MacOS, Android and Linux, may allow attackers to defeat VPN security.

Exploit kits turn to fileless malware to evade security tools

Exploit kits turn to fileless malware to evade security tools

Increasing numbers of ready-made 'exploit kits' are using extremely stealthy fileless attacks to compromise victims, creating a big challenge for defenders...

Security or visibility? Pick one

Security or visibility? Pick one

Redmond giant Microsoft has joined Google and Mozilla in support of DNS over HTTPS (DoH), promising upcoming integration of DoH into Windows 10: business visibility concerns rise

Lack of firewall automation increasing business risk

Lack of firewall automation increasing business risk

Firewall automation might be in the headlines, but enterprises are struggling to make sense of the opportunity on the ground, potentially leading to increased security risk, according to a new report

Nikkei falls foul of  £22 m BEC scam in a single transaction

Nikkei falls foul of £22 m BEC scam in a single transaction

Tokyo-headquartered media giant loses £22 million to Business Email Compromise (BEC) fraud in a single transaction.

MikroTik router compromise exploit detailed

MikroTik router compromise exploit detailed

Researcher details the fascinatingly winding path from DNS request to root access on MikroTik routers

Researchers uncover Magecart Group 5 and Carbanak Group link

Researchers uncover Magecart Group 5 and Carbanak Group link

Merchant supply chain compromise group linked to high-level bank espionage gang via domain registration details

UK 'solidifies' plans for offensive cyber capabilities

UK 'solidifies' plans for offensive cyber capabilities

Latest announcement indicates that UK's cyber offensive strategy still at the planning stage

DevOps causes majority of IT companies to live on the edge of cyber-risk

DevOps causes majority of IT companies to live on the edge of cyber-risk

Research into DevOps reveals siloed thinking, lack of expertise and correct tools contributing to nearly half of firms not having completed developing their DevOps strategies, leaving companies vulnerable.

Where's the CISOs? - missing from more than a third of Fortune 500

Where's the CISOs? - missing from more than a third of Fortune 500

Shocking new report finds that not only are many major enterprises missing a CISO, but also security strategy roles and data protection mission statements are also absent.