GUEST RESEARCH: Bitdefender has combined information from openly available sources (OSINT) – including news reports and research – with data we gather by analysing Data Leak Portals (DLPs), websites where ransomware groups post details about their victims to develop our March 2025 Threat Debrief. It’s important to remember that we can't independently verify all of these claims, but we can feel quite confident in the trends we see over time.
Fifty-one percent (51%) of employees were disciplined, 27% voluntarily left the organisation and 39% were fired following their involvement with a phishing incident, according to research undertaken by threat intelligence company Egress.
GUEST OPINION by Asjad Athick, Principal Security Specialist at Elastic: Whenever a major cybersecurity incident occurs, there are two things everyone asks. Could it have been prevented,and what did the victim of the attack do to minimise the damage? The left side of that equation, prevention, is critical and is often the focus of cybersecurity strategies. This is hardly surprising, with the Australian Cyber Security Centre receiving reports of a new cyber-attack every eight minutes – a rate that has been accelerating annually.
A new research report has debunked five “false assumptions” that people have about social engineering which are integral to why so many fall victim to these forms of cyberattack.
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]
I wonder when they will implement all of this, and what the pricing plans will be.FWIW, these days the proposed[…]