Articles

  • 1 week ago | welivesecurity.com | Phil Muncaster

    Remember when you used to have to print, sign, scan, email and/or even fax every time you wanted to sign and send an official document? Today, much of the hard work is done behind the scenes by cloud app providers like Docusign. But like all tech brands, once it has reached a critical mass of users, cybercriminals will look for ways to abuse it for their own ends. Docusign claims to have 1.6 million customers around the world, including 95% of the Fortune 500, and over one billion users.

  • 2 weeks ago | infosecurity-magazine.com | Phil Muncaster

    Microsoft has teamed up with law enforcement agencies across the globe to disrupt the infrastructure behind one of the world’s most notorious infostealer operations. Microsoft said that, between March 16 and May 16, it identified over 394,000 Windows computers globally that were infected with Lumma Stealer malware.

  • 2 weeks ago | infosecurity-magazine.com | Phil Muncaster

    Dozens of Western logistics and tech firms delivering aid to Ukraine have been targeted by a Russian state-backed cyber-espionage campaign over the past two years, allied security agencies have warned. The unnamed companies operate across the defense, IT services, maritime, airports, ports and air traffic management systems sectors in the US and European countries.

  • 2 weeks ago | infosecurity-magazine.com | Phil Muncaster

    A majority of Americans have grave concerns about providing biometric information online and two-fifths (39%) argue the technology should be banned, according to new research from the Identity Theft Resource Center (ITRC). The non-profit, which helps consumers and organizations mitigate the impact of identity crimes, polled 1177 individuals for its Biometric Consumer Attitude Report.

  • 2 weeks ago | infosecurity-magazine.com | Phil Muncaster

    Organizations looking to securely decommission end-of-life IT assets now have a useful how-to guide published by the National Cyber Security Centre (NCSC). The agency warned that safely retiring data, software and hardware is a critical endeavor with “potentially severe repercussions” if not done right. IT assets allowed to continue beyond their lifespan may pose a risk to the organization if they are lost, exploited or accessed by unauthorized individuals, it argued.

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →

X (formerly Twitter)

Followers
6K
Tweets
8K
DMs Open
No
Phil Muncaster
Phil Muncaster @philmuncaster
2 Apr 25

The @ICOnews is failing badly in answering data protection complaints on time. Just 12% in the past quarter. Too many complaints, not enough staff. Are people more informed about privacy rights or are companies doing worse on data protection? https://t.co/BhERjpAzLK

Phil Muncaster
Phil Muncaster @philmuncaster
27 Mar 25

What will happen when the US abandons Ukraine? CISOs should take note. My latest for @Assured_Intel: https://t.co/xphkDwmb2Z

Phil Muncaster
Phil Muncaster @philmuncaster
14 Mar 25

VC funding for cyber startups surges 35% YoY in Q4 2024, according to @PitchBook. In the UK, deal value for 2024 was down 24% from the previous year. Time to get worried? https://t.co/PaSCdJnXmZ