24th June 2025
Hilton London Canary Wharf
11th November 2025
Hilton London Canary Wharf
Search
Close this search box.

How hackers get caught

Cyber criminals are intelligent, elusive individuals, making it difficult for law enforcement to track them down. Not all hackers manage to escape retribution, however. Here, Joanne Newton, deputy head of the school of computing at Arden University, explores the traps they fall in to, and how they get caught… Cyber criminals go to many lengths […]

Five top tips for improving your cyber security visibility and control 

By Leyton Jefferies, Head of Security Services, CSI With an increasing number of high-profile security breaches splashed across the media, companies are now looking to improve their cyber security. As the world has become more digitally connected and working from home continues to be part of the way we work, there has become more opportunity […]

ContiLeaks: Ransomware gang suffers data breach

By Varonis Conti, one of the most infamous, prolific and successful big game ransomware threats, has suffered yet another embarrassing leak with a treasure trove of both internal chat transcripts and source code being shared by a reported Ukrainian member. Having previously had their internal manuals and tools exposed by a disgruntled affiliate in August […]

IT security in 2022 – what you need to know

By Jack Rosier of QMS International, one of the UK’s leading ISO certification bodies We’re living in the age of computers, with technology playing a more important role in our lives with each passing year. With the pandemic acting as a catalyst for increasing digitalisation, 2022 is likely to see more technology usage than ever […]

Backup is dead: True Cyber Protection is the way ahead

By Adam Brace, EveryCloud So, is Backup Really Dead? In the traditional sense we would say yes, as Cyber Criminals have developed and deployed ways that mean backing up alone is not enough to provide true data protection. Now (and especially in the future), to be fully protected, organisations need to ensure their data is recoverable, […]

Identify and investigate Business Email Compromise (BEC) scams

Business Email Compromise is an email-based phishing attack that specifically targets businesses and organizations to steal money, sensitive information, or account credentials. These attacks can be difficult to prevent as criminals may utilize social engineering techniques such as impersonation and intimidation to manipulate users. Threat actors will often prepare for BEC attacks by first performing […]

Ransomware Year in Review 2021

By Varonis In 2021, attacks became highly effective and impactful. At the same time, high-volume indiscriminate ransomware threats remained omnipresent throughout the year. In this post, the Varonis Threat Labs team shares what they observed in the wild while working on ransomware investigations. Overall, the team identified these five ransomware trends that shaped 2021: Ransomware-as-a-Service […]

The rise of Ransomware-as-a-Service and how organisations can protect themselves 

By Keith Glancey, Head of Solutions Architect at Infoblox Over the years, ransomware has become an increasingly popular attack method for hackers looking to make a large return on investment. The COVID-19 pandemic only accelerated this problem further, opening up new opportunities for cybercriminals to cause disruption and find vulnerabilities. As businesses continue to struggle […]

Cybersecurity priorities: Why AI-powered threat detection should be in your plans

By Atech Cloud The changed world we’ve found ourselves living in since the global pandemic struck in 2020 has been particularly helpful to cybercriminals. Nothing illustrates this so well as the SolarWinds hack, described by Microsoft president Brad Smith as the most sophisticated cyberattack of all time, the reverberations of which have been felt throughout […]

Salesforce security: 5 ways your data could be exposed

By Varonis Salesforce is the lifeblood of many organizations. One of its most valuable assets-the data inside-is also its most vulnerable. With countless permission and configuration possibilities, it’s easy to leave valuable data exposed. That, coupled with the fact that most security organizations aren’t very familiar or involved with Salesforce’s administration, opens organizations up to massive risk. Here […]