+44 (0)203 88 020 88

Menu

Search

cyber crime

What The Jaguar Land Rover Cyberattack Means For Business Cyber Risk Management

Jaguar Land Rover suffered a severe cyberattack at the end of August 2025 that forced the company to shut down parts of its global network, suspend vehicle production and triage a complex recovery across the United Kingdom, Europe, India, China and Brazil. The incident was detected on 31 August when unusual activity appeared in internal […]

What The Jaguar Land Rover Cyberattack Means For Business Cyber Risk Management Read More »

F5 Discloses Nation-State Intrusion While Stating Operations Remain Unaffected

F5 has disclosed that a nation-state threat actor gained unauthorised access to parts of its internal environment, prompting a coordinated incident response that the company says prevented impact to customer-facing systems and day-to-day operations. The disclosure, made public on Wednesday 15 October 2025, arrived alongside government warnings about potential follow-on risk to organisations that deploy

F5 Discloses Nation-State Intrusion While Stating Operations Remain Unaffected Read More »

OpenAI Disrupts State-Linked Misuse of ChatGPT for Cyberattacks

OpenAI has revealed that it disrupted three coordinated operations by state-linked actors from Russia, North Korea and China who attempted to exploit ChatGPT to assist in developing malware, conducting phishing campaigns and supporting online influence activity. The announcement offers an unusually detailed look at how nation-state adversaries are beginning to incorporate large language models (LLMs)

OpenAI Disrupts State-Linked Misuse of ChatGPT for Cyberattacks Read More »

Strela Stealer Malware – From Invoice Phishing to Thread Hijacking

In recent months, a notable wave of cyber-attacks has swept across Europe, orchestrated by the cybercriminal group known as Hive0145. This group, also referred to by various threat intelligence entities as a highly organised Advanced Persistent Threat (APT), has been delivering a specific strain of malware—Strela Stealer—to infiltrate and compromise systems. Targeting countries primarily including

Strela Stealer Malware – From Invoice Phishing to Thread Hijacking Read More »

WinRAR Remote Code Execution Flaw Patched

A high severity vulnerability has been found in RARLAB’s popular Windows file archiver WinRAR. Security researchers at the Zero Day Initiative who first identified this vulnerability in June have published a security advisory about this flaw now that an update has been issued by the vendor. This vulnerability has the possibility of allowing remote, unauthenticated

WinRAR Remote Code Execution Flaw Patched Read More »

Stack-Based Buffer Overflows in Ivanti Avalanche

Multiple stack-based buffer overflows have been identified in Ivanti Avalanche, tracked as a single vulnerability with a critical severity rating and CVSS base score of 9.8/10. Ivanti Avalanche is an enterprise mobility management (EMM) solution used by organisations to manage and monitor mobile devices securely. Researchers at Tenable discovered and investigated these flaws, publishing an

Stack-Based Buffer Overflows in Ivanti Avalanche Read More »

Canon Printers Retain Wi-Fi Information After Wipe

Canon Inkjet printers have been found to retain sensitive Wi-Fi information after the usual wipe that is performed in the initialisation process. Canon have released a security advisory to warn their customers that information that can be used to connect to previously connected Wi-Fi is kept within the memory of the Wi-Fi connection settings, and

Canon Printers Retain Wi-Fi Information After Wipe Read More »

0

No products in the basket.

No products in the basket.