You place your order, make the payment, and only later notice a small detail: just one letter in the website address was different. That’s how easily you can fall into a cybercriminal trap. If you’re lucky, the amount lost is small, and your bank acts fast — refunding the money and reissuing your card. But...Read More
If pathways into cybercrime are social and developmental, effective responses should be, too. This section focuses on identifying intervention points across the recruitment cycle and reviewing programmatic responses, from diversion and skills-redirection to structured rehabilitation. The cases mentioned at the beginning of this brief—Ansari, Kurtaj, and members of Scattered Spider—show a range of responses from...Read More
“I also encourage you to collaborate with each other. Share what you are seeing and experiencing. That’s such an effective way to mitigate some of these risks.”– Jess Thomas, Assistant Director, National Office of Cyber Security (NOCS) What businesses should do right now Within businesses, Smale says, it’s best to boil cyber defence down to...Read More
“I also encourage you to collaborate with each other. Share what you are seeing and experiencing. That’s such an effective way to mitigate some of these risks.”– Jess Thomas, Assistant Director, National Office of Cyber Security (NOCS) What businesses should do right now Within businesses, Smale says, it’s best to boil cyber defence down to...Read More
Published on 20/03/2026 – 13:18 GMT+1 Two of the world’s largest bot networks were shut down in a major international operation, authorities announced on Friday. ADVERTISEMENT ADVERTISEMENT German, US and Canadian cybercrime specialists joined forces to dismantle Aisuru and Kimwolf, suspected of being behind major online attacks. They “posed a significant threat to IT infrastructure...Read More
Posted: Mar 20, 2026 7:13 AM CDT by Justin Walker BY JAMEY TUCKER, Consumer Tech Reporter For years, iPhone users have heard the same thing. If you want security, buy an iPhone. And Apple has earned that reputation. In fact, iPhones and iPads were recently approved to handle classified NATO-restricted information. But even the...Read More
In a March 15 update Stryker said all connected, digital and life-saving technologies used by customers remain safe to use. “This event was contained to Stryker’s internal Microsoft environment, and as a result it did not affect any of our products—connected or otherwise,” the statement said. No ransomware or malware was deployed, the company added. In...Read More
Investigators on Friday said they had worked with partners in the United States and Canada to shut down infrastructure linked to the “Aisuru” and “Kimwolf” networks. The so-called botnets, made up of millions of infected devices, were used for large-scale Distributed Denial of Service (DDoS) attacks that can overwhelm entire websites and onlines services. What do...Read More
Join us as we celebrate a decade of the Women in Cybersecurity programme with sessions designed to inspire, empower and catalyse real change. The Women in Cybersecurity event will take place place at Infosecurity Europe 2026 at the London Excel on Wednesday 3 June from 15:00 to 18:00 on the Keynote Stage. Register for Infosecurity Europe 2026...Read More
The FBI has seized domains linked to Iranian cyber espionage activities, including those run by the group behind the Stryker attack. Seized domains belonging to Handala – Handala-Hack and Handala-Redwanted – now feature notifications advising visitors that the sites have been seized by The move by the FBI follows a highly disruptive attack by Handala...Read More