10-step guide for testing a backup and recovery plan
10-step guide for testing a backup and recovery plan Summary This practical guide explains why and how organisations should regularly test their backup and recovery plans. It outlines a ten-step…
10-step guide for testing a backup and recovery plan Summary This practical guide explains why and how organisations should regularly test their backup and recovery plans. It outlines a ten-step…
Michigan Supreme Court Rules Unrestricted Phone Searches Violate Fourth Amendment Summary In People v. Carson the Michigan Supreme Court held that warrants allowing police to search every corner of a…
Hook Android Trojan Now Delivers Ransomware-Style Attacks Summary The Hook Android banking trojan has evolved into a far more dangerous strain: the latest variant includes ransomware-style full-screen overlays that lock…
The Hidden Risk of Consumer Devices in the Hybrid Workforce Summary The article warns that consumer devices — routers, cameras, smart plugs and other IoT gear — are an expanding…
The Era of AI-Generated Ransomware Has Arrived Summary New reporting from WIRED (Aug 27, 2025) outlines how generative AI is being integrated into ransomware operations. Research from Anthropic found a…
Citrix Gear Under Active Attack Again With Another Zero-Day Summary Citrix has disclosed three new vulnerabilities affecting NetScaler ADC and NetScaler Gateway devices. One of them, CVE-2025-7775, is a memory-overflow…
Malicious Scanning Waves Slam Remote Desktop Services Summary Researchers detected two large coordinated scanning waves targeting Microsoft Remote Desktop Protocol (RDP) authentication portals in the US. GreyNoise flagged a surge…
Data I/O Becomes Latest Ransomware Attack Victim Summary Data I/O, a Redmond, Washington-based tech manufacturer, disclosed a ransomware incident that began on 16 August 2025. The company activated incident response…
African Law Enforcement Agencies Nab Cybercrime Syndicates Summary Operation Serengeti 2.0 brought together law enforcement from 18 African nations, Interpol, Afripol and private partners to investigate and arrest more than…
1M Farmers Insurance Customers’ Data Compromised Summary Farmers Insurance, Farmers Insurance Exchange and affiliated companies filed a breach notification after an unauthorised actor accessed a third‑party vendor database on 29…