The report provided by VIPRE Security Group concerning their Q3 2025 Email Threat Landscape Report, which details how cybercriminals are using increasingly sophisticated methods to bypass traditional email defences. The report reveals that commercial clutter makes up the largest proportion of email volume and is intentionally used to desensitise users, enabling malicious emails like phishing attempts to blend in. Key findings highlight that attackers frequently exploit compromised URLs or open redirects and are strategically targeting Outlook and Google mailboxes, which together constitute ninety per cent of observed phishing attacks. Furthermore, the report notes emerging technical trends such as the use of Fetch API for credential exfiltration and the abuse of Apple’s TestFlight platform to distribute malicious iOS applications, while acknowledging that geographic dispersion across spam-sending markets is making traditional IP blocking ineffective. Overall, the source stresses that organisations must adopt equally adaptive and layered defences to counter the evolving threat landscape. Continue reading
Tag Archives: Computer security
Geopolitical and Digital Disruption Risk Trends
“Risk in Focus,” by The Institute of Internal Auditors’ Internal Audit Foundation, highlights significant shifts in the global risk landscape. The research, based on feedback from over 4,000 internal audit professionals, indicates that geopolitical uncertainty and digital disruption have seen the largest increases in risk levels this year. Despite this, cybersecurity remains the highest-rated risk worldwide. The report also notes a gap between the perceived high risk of areas like geopolitical uncertainty and digital disruption and their relatively lower audit priority ratings globally, urging practitioners to address these growing risks proactively through related areas like business resilience and regulatory change. Continue reading
Security delivered for working people as UK-US ties strengthened with new Google Cloud partnership for classified information sharing
From:
Ministry of Defence and The Rt Hon John Healey MP
Published
12 September 2025
UK – US defence and security ties enhanced through major deal with Google Cloud – delivering the Government’s Plan for Change.
Continue reading
OpenSSF Launches Free Course to Prepare Developers for the EU Cyber Resilience Act
The Open Source Security Foundation (OpenSSF), in collaboration with LF Education, announces the general availability of LFEL1001, a free online course designed to help software developers understand and prepare for the requirements of the European Union (EU) Cyber Resilience Act (CRA). Continue reading
Cybersecurity Priorities 2025
Jan. 23, 2025 /Mpelembe Media/ — Info-Tech Research Group’s 2025 Security Priorities report identifies key cybersecurity challenges, including the rise of AI-powered threats and quantum computing. The report, based on extensive research, advises organisations to proactively manage risks by operationalising AI security, strengthening identity management, and building resilient vendor security practices. Continue reading
UK Banking IT Failures and Security Concerns
Jan. 7, 2025 /Mpelembe Media/ — New research from the UK reveals that a significant portion of the British public is keeping cash on hand due to concerns about banking IT failures. One in four Brits report this behaviour, highlighting a growing distrust in digital banking systems. Concerns centre on the frequency of IT outages and the potential for data breaches, impacting consumer confidence. The research underscores the need for banks to improve IT security and transparency to reassure customers. Continue reading
$315 Billion Biometric Digital Identity Market
Jan. 7, 2025 /Mpelembe Media/ — The Prism Project’s report on the biometric digital identity market projects a $315 billion revenue opportunity by 2024, driven by increasing adoption across various sectors. Key findings highlight significant growth in biometric and digital identity transactions globally, alongside challenges and opportunities within the industry.
Continue reading
As an ethical hacker, I can’t believe the risks people routinely take when they access the internet in public
Christopher Patrick Hawkins, University of Staffordshire
In the modern world we are all constantly connected, but this comes with risks. As most cybersecurity specialists will tell you, the biggest vulnerability in any system is the user – whether at home or work.
One in Four CPS-Enabled Organizations Lost $1M+ from Cyber Attacks in Last Year
Claroty, the cyber-physical systems (CPS) protection company, today released new research illuminating the significant business impacts of cyber attacks affecting CPS environments. The report, “The Global State of CPS Security 2024: Business Impact of Disruptions,” is based on a global independent survey of 1,100 infosecurity, OT engineering, clinical & biomedical engineering, and facilities management & plant operations professionals about the business impacts of cyber attacks on their organizations in the past 12 months. Continue reading
Humana Group and Google Cloud Collaborate to Improve IT Security in Care
Humana Group, one of the Nordic region’s largest care companies, and Google Cloud today announced they are joining forces to increase IT security in the healthcare space, improving control over data management and simplifying collaboration for Humana employees in its Nordic organization. Continue reading
